NPI Technology Management Blog


Datto surveyed 1,700+ Managed Service Providers serving 100,000+ small-to-mid-sized businesses around the globe and here are some of the results: Only 38 percent of SMB clients are “highly concerned” about the business threat of ransomware The ransom isn’t what breaks the bank. The downtime and data loss cut the deepest Among those industry verticals who […]

It’s 9 am and you’re running late for a meeting with your IT manager. You know she’s going to be throwing around “techie” terms that make no sense and you haven’t even had time for coffee yet!  While we can’t get you the coffee, we can give you a crib sheet of technical terms and […]

The general perception is that only large businesses have vulnerabilities to cyber breaches. In truth, small businesses are just as much of a target as large corporations.  Hackers know that smaller businesses don’t invest as heavily in security or stay informed about the latest exploits. And, best of all, they typically have a treasure trove […]

All businesses–regardless of size–have a digital presence. This mandates that both mundane and mission critical data must be regularly backed up and ready for recovery at the drop of a hat. Whether it is managed in-house or outsourced, business owners and financial managers don’t always know what data is backed up, how often it’s backed […]

The WannaCry ransomware attack ended up causing tens of millions of dollars of damage when it encrypted important data at business, hospitals and government offices around the world.  Unfortunately, many of the victims are to blame in this case because they fell for a phishing message that attacked systems that were not properly updated. This […]

Lamoille Economic Development Corporation (LEDC), Cybersecurity for Small Business  

Ransomware and other types of hacking attacks have gained more attention in the news this year and have hit the radar of senior business managers.  However, there is little information about the devastating effects of social engineering on business operations.  Although it sounds like a benign technical term, social engineering is actually a form of […]

Today’s C-level executives would be wise to watch a few episodes of the USA network hit series Mr. Robot.  The technology details in the show are provided by a security expert, former hacker Kor Adana.  He recently provided 10 insightful ways to avoid being attacked. Mr. Robot is one of the most accurate cybersecurity shows […]

Today’s employees virtually live on their mobile devices — not just during the work day but well beyond — from virtually anywhere on the planet. I’ve noticed that about half of Vermont’s employees use their personal devices for business email and many use it for other company business as well. Because mobile devices have become […]