Blog posts, our latest Technology for Business Podcast episodes, & info on upcoming events

Microsoft’s New Commerce Experience

Microsoft’s New Commerce Experience is now available for all per-user subscriptions. Unfamiliar with New Commerce Experience (NCE)? It was initially announced back in 2019 with Azure as a simplified journey for both the customer and the partner to transact a consistent and standardized purchase motion. This time around, New Commerce Experience is transitioning subscriptions like Office […]

CIT Achieves Blue Diamond Partner Status with Datto

Computer Integration Technologies, Inc. (CIT) Achieves Blue Diamond Partner Status with Datto CIT has achieved exclusive Blue Diamond partner status with Datto, the leading global provider of cloud-based software and technology solutions purpose-built for delivery by managed service providers (MSPs). Datto Blue Diamond status represents the top 2 percent of the company’s partners, worldwide.  CIT […]

Is Your Company Ready for a Cyberattack?

Is Your Company Ready for a Cyberattack? Can you ever be ready for a cyberattack—yes, you can! Asking if you are ready for a cyberattack is like asking if you are ready for an accident. When an accident occurs, you can have insurance and the coverage you need to take care of the problem—with a […]

Combatting Business Email Compromise Risks 

Combatting Business Email Compromise Risks  An old scam that keeps reinventing itself with new victims. Don’t become one!  You’ve probably heard the classic business email compromise (BEC) scam about Nigerian princes who want to deposit money in people’s bank accounts—but first need their prey to send them money to make it all work to plan. It’s an oldie but goodie. Unfortunately, it’s also one that keeps reinventing itself along with another […]

What is CMMC?

What is CMMC? The Cybersecurity Maturity Model Certification (CMMC) is a program developed by the Department of Defense (DoD) to help measure the cybersecurity maturity level of contractors across the defense industrial base (DIB), which includes over 300,000 companies. The CMMC is the DoD’s response to significant increase in compromises of sensitive data located on […]

Not All MFA is Created Equal: Advantages and Disadvantages of Common Forms of MFA

Not All MFA is Created Equal: Advantages and Disadvantages of Common Forms of MFA If you’ve spoken to anyone in the cybersecurity industry in the past few years, you’ve probably heard at least once “multi-factor authentication (MFA) is one of the best things you can do to protect yourself and your organization.” But what, you […]

Putting people and productivity ahead of software or hardware. Let’s connect and make technology work for your business.