Our Blog

Category:

Why Enterprise Risk Management is the Key to Organizational Resilience

Disruptions to business operations are almost inevitable, and they never occur within the desired timeframe. Nothing made that more clear to business owners than the COVID-19 pandemic. It was a wake-up call for many, as organizations of all sizes and industries were forced to pivot and adjust in the...?

Read More

How did your IT firm react to Log4j?

Preparation is often half the battle, and that holds true for many things – but more often than not, it holds especially true with cybersecurity. On Friday, December 10, 2021, news broke of active exploitation of a critical vulnerability (CVE-2021-44228) in a common component of Java-based sof...?

Read More

XDR, EDR, MDR, and SIEM | Understanding Extended Detection & Response

The technology industry, and in particular, cybersecurity, is crammed with jargon and acronyms. IT departments find it challenging to navigate the vendor landscape, especially when finding detection and response solutions. The truth is, cyber attackers evolve daily and subsequently, the tools to com...?

Read More

How to Know When It’s Time to Outsource Your IT Projects

How to Know When It’s Time to Outsource Your IT Projects The role of IT in an organization is more critical than ever before. As an organization’s technical footprint grows, so does its threat landscape, and maintenance obligations. Burdened with standard management, firms of all sizes ...?

Read More

What Is Co-Managed IT Services, And Why You Should Be Thinking About It Now

What Is Co-Managed IT Services, And Why You Should Be Thinking About It Now Managing the IT infrastructure of an organization is never a one-person job. As such, businesses develop IT teams to handle all IT services. However, more and more companies, especially (small-to-medium-sized businesses) SM...?

Read More

How to Select a VoIP or Phone Service Provider

Picking VoIP or phone service vendors for your business can be a tedious exercise. There are dozens of options out there, local and national providers, and reviewing costs against pages and pages of terms of service can be a drawn out process. We can all agree, fine print is a foe of clarity and pro...?

Read More
Featured posts

Tips for Digital Transformation

Drive impact at your organization with the latest on IT leadership

View all post

Why Enterprise Risk Management is the Key to Organizational Resilience

Disruptions to business operations are almost inevitable, and they never occur within the desired timeframe. Nothing made that more clear to business owners than the COVID-19 pandemic. It was a wake-up call for many, as organizations of all sizes and industries were forced to pivot and adjust in the...?

Read More

How did your IT firm react to Log4j?

Preparation is often half the battle, and that holds true for many things – but more often than not, it holds especially true with cybersecurity. On Friday, December 10, 2021, news broke of active exploitation of a critical vulnerability (CVE-2021-44228) in a common component of Java-based sof...?

Read More

AlphaRidge Acquires Lynx Managed IT Services Business

ALPHARIDGE ACQUIRES LYNX MANGAGED IT SERVICES BUSINESS Lynx Focuses On Security As AlphaRidge Acquires Managed IT Services   FOR IMMEDIATE RELEASE Tuesday July 31, 2018 CONTACT: Krista Kaszycki krista@alpharidge.com   Doug Yarabinetz dyarabinetz@lynxtp.com   New York, NY, ...?

Read More

5 Tips for Remaining HIPAA Compliant

As Amazon’s Alexa becomes increasingly concerned with HIPAA (Health Insurance Portability and Accountability Act) compliance, we thought we’d share 5 quick tips to help keep individual physician practices HIPAA compliant.   Backup & Failover Having a backup of your ...?

Read More

When Should I Replace My Firewall?

We’ve worked with a lot of firewalls here at AlphaRidge. Every now and again we encounter a real dinosaur, firewalls as old and clunky as a cassette player (okay, maybe not that old but you get the picture). While Apple might push you on a yearly upgrade, not all hardware has nor should it hav...?

Read More

Phishing Trip Canceled – How to Identify & Avoid Phishing Attempts

Every single day thousands of phishing attempts hit inboxes around the world. Many of them will be far less obvious than others. But what is phishing, and why is it so harmful? What are some techniques to help you identify and avoid phishing attacks? Phishing is the attempt to access sensitive info...?

Read More

Best Practices for Managing Software Development Projects

Recent studies have suggested that as much as 85% of software development projects fail. Often an organization will bring on a software developer without an in-depth consideration of the resources – both financial and otherwise – that software development projects demand. Alpha...?

Read More
Featured posts

Cybersecurity & Compliance

Champion secure and compliant growth and innovation with advice from our expert leaders

View all post

XDR, EDR, MDR, and SIEM | Understanding Extended Detection & Response

The technology industry, and in particular, cybersecurity, is crammed with jargon and acronyms. IT departments find it challenging to navigate the vendor landscape, especially when finding detection and response solutions. The truth is, cyber attackers evolve daily and subsequently, the tools to com...?

Read More

When Should I Replace My Firewall?

We’ve worked with a lot of firewalls here at AlphaRidge. Every now and again we encounter a real dinosaur, firewalls as old and clunky as a cassette player (okay, maybe not that old but you get the picture). While Apple might push you on a yearly upgrade, not all hardware has nor should it hav...?

Read More

Stay on top of your it!

Get our helpful IT tips and tricks delivered right to your email PLUS you'll be the first to hear about our events and live webinars!