GRIT Technologies Visits The Classroom

Our very own Jason Zurro was front and center stage last week at Dawson Elementary School's Career Day.  Jason was invited to speak to Dawson's 2nd grade class about his role as a Network Operations Manager and discussed several different areas of interest within the IT industry.

GRIT Technologies and Datto CISO Discuss Cyber Resiliency

In this past few years there has been a shift across the IT industry from Cybersecurity, over to Cyber Resiliency. The idea is to have the people, processes and procedures in place ahead of time, so you can quickly respond to a breach, when it happens.

Cybersecurity Awareness Month: Why You Should Follow The 3-2-1 Backup Rule

Backing up your data regularly is an overlooked step in personal online security. The top IT and security managers follow a simple rule called the 3-2-1 backup rule. Essentially, you will keep three copies of your data on two diverse types of media (local and external hard drive) and one copy in an off-site location (cloud storage). 

If you become a victim of ransomware or malware, the only way to restore your data is to erase your systems and restore with a recently performed backup.

GRIT Named to Inc. 5000 Fastest-Growing Companies List for the 4th Year in a Row.

For the 4th year in a row, GRIT Technologies announced today that the company has been selected for the 2021 Inc. 5000 Fastest-Growing Private Companies in America list. With 96% revenue growth over the past three years, it secured spot 3,540 on the list.

Webinar: The Data’s In The Details

This past month we had a great time talking with our partners over at SPARK Business Works in our latest webinar. If you are struggling with how to track productivity with your remote teams, grab yourself a cup of coffee and check it out.

 

 

The truth is that the paradigm shift to remote work is uncharted territory for many global enterprises.

Career Opportunity: Engineer (Level 2)

Job Description

System Engineers are strong in all the most common and popular networking technologies. In addition to strong technical aptitudes, backed by at least 2 years of in-the-trenches experience, this person is a good communicator and a person who can manage well when the client really needs strong guidance.

Cybersecurity Awareness Month: Why You Should Monitor The Dark Web

Let's ask a question.  If you don’t know something is a problem, how can you take action?

One of the biggest problems businesses are facing is stolen credentials from data breaches.  These credentials are sold on the dark web and are used to gain access to business networks to steal data, deploy malware, or encrypt and hold the data hostage.

Webinar: Expecting The Unexpected

We had a fantastic turnout for our Expecting The Unexpected workshop.  We covered a lot of material and wanted to provide you with the recording so you can review it again or share it with others in your organization.

When it comes to cybersecurity, you don’t have to be a news junkie to realize that ransomware incidents are on the rise.

Improve your overall cybersecurity posture by empowering your workforce to recognize and prevent social engineering attacks. Our FREE eBook will teach you how to design and implement a cybersecurity awareness training program that works.Learn more here
+