BusinessCybersecurityIT Security Top 10 Types of Spoofing AttacksSpoofing attacks can either be perpetrated through general tactics such as simply impersonating a trusted…Steve LoyerJuly 29, 2021
BusinessCybersecurityIT Security How Can Security Leaders in Healthcare Help Protect Employees and Data?With the requisite knowledge and appropriate tools and response mechanisms at their disposal, healthcare employees…Mary LoyerJuly 23, 2021
CybersecurityIT Security Budgeting for Cybersecurity: Tips for cost-effectivenessIt can be difficult to know how much your business should spend on cybersecurity –…Mary LoyerMarch 20, 2021
IT SecurityManaged IT ServicesManaged Security Services Managed Security Services Provider: 3 Step EvaluationWhile making sure your functional requirements are being met is important, your first few interactions…Steve LoyerMarch 11, 2021
CloudCloud Computing AI enabled Data Center Transformation in VermontArtificial Intelligence tools have the power to ‘learn’. So, these tools can learn the usual…Mary LoyerFebruary 13, 2021
BusinessIT Security Ensuring Data Security for Remote WorkersThere is a vast difference between infrastructure security on office premises and when working remotely.…Steve LoyerFebruary 5, 2021
BusinessCloudCloud Computing 7 Cloud Predictions for the Near FutureBefore the pandemic, 88% of organizations used the cloud in one form or another which…Mary LoyerJanuary 23, 2021
BusinessIT SecurityIT Support 10 Steps to Build a Successful Business Continuity PlanBusiness Continuity (BC) refers to the ability of a business to jump back and resume…Steve LoyerJanuary 17, 2021
BusinessCloudIT Support Anywhere Operations: Major Strategic Trend in 2021Apart from ensuring infrastructure resilence and seamless operations delivery, anywhere operations can also help businesses…Mary LoyerDecember 28, 2020
BusinessCloud ComputingIT Security Cloud Computing & Security Sales a Priority in 202132% of total enterprise IT budgets will be allocated to cloud computing in 2021, up…Steve LoyerDecember 19, 2020
BusinessManaged IT Services Top Tips and Tricks To Reduce Your IT Costs With MSPsWhile capital expenditure is definitely reduced with MSPs, their advantages go far beyond that in…Mary LoyerNovember 23, 2020
IT Security 6 Reasons Why You Should Consider Outsourcing Cyber Security ServicesCyber security is no longer just a part of the background noise – it is…Steve LoyerNovember 18, 2020
In The News Webinar August 26, 2020 at 11:00 a.m.TOPIC: Energy and Utility Cybersecurity Threats, Compliance Trends and Best Practices During Uncertain Times Join…Mary LoyerAugust 10, 2020
In The News Webinar July 29, 2020 at 11:00 a.m.TOPIC: Cyber Threats Healthcare Organizations Should Be Looking Out for in These Unprecedented Times Join…Steve LoyerJuly 16, 2020
In The News Join us for Client Appreciation NightWe are excited to be co-hosting this years client appreciation night with our new partner…Mary LoyerMay 29, 2019
In The News Winner of the BOB Award..AGAIN!Tech Group, LLC has won the 2019 Best of Business (BOB) Award for Best IT…Steve LoyerApril 30, 2019
In The News 10th Annual Howard Center Curling Challenge Members of "Team Tech Group" participated in the annual Curling Challenge to support the…Mary LoyerMarch 20, 2019
In The News TG to host Annual Client Appreciation NightYou are invited to be our guest on July 25 at the Vermont Lake Monsters vs…Steve LoyerJuly 6, 2018
In The News Winner of the 2018 Best of Business (BOB) AwardTech Group, LLC has won the 2018 Best of Business (BOB) Award for Best IT…Mary LoyerApril 6, 2018
In The News Job Opening: Senior Network Engineern: (net-work en-gi-neer) A person who solves problems others can’t. We’re looking for a Senior…Steve LoyerMarch 27, 2018