Create a Disaster Recovery Plan to Protect Your Data
Infrastructure Security

Create a Disaster Recovery Plan to Protect Your Data

Your company’s most precious business resource is its data. What is your game plan for protecting it? Data loss cripples businesses – studies show that over 50% of businesses hit by cyber-crime close their doors within 6 months. What measures are you taking while cyber-criminals step up their game? If...
Read More
What is a CMMC RPO?
CMMC Infrastructure News Security

What is a CMMC RPO?

Throughout 2020, the U.S. Department of Defense released details surrounding the Cybersecurity Maturity Model Certification (CMMC) requirements for companies in the defense industrial base (DIB). These new consolidated cybersecurity requirements are driving suppliers and contractors to dedicate time, money, and other resources to strengthen their cybersecurity strategy to meet compliance. Depending on the...
Read More
The Greentree Group is a CMMC Registered Provider Organization (RPO)
CMMC Infrastructure News Security

The Greentree Group is a CMMC Registered Provider Organization (RPO)

We are now a Cybersecurity Maturity Model Certification (CMMC) Registered Provider Organization (RPO) authorized by the CMMC-AB. This new achievement solidifies our position as a leader in CMMC compliance solutions and services meant to protect government data in defense contractor systems. According to the National Accreditation Board, CMMC-AB is an...
Read More
7 Cybersecurity Tips for SMBs
Infrastructure Networking Security Tips

7 Cybersecurity Tips for SMBs

7 cybersecurity tips for small and medium-sized businesses (SMBs), brought to you by Back To Business I.T. Antivirus and Filters Scanning your systems regularly to detect malware and potential vulnerabilities should be at the top of the list when it comes to cybersecurity measures. Putting web and email filters in...
Read More
Managing Your Digital Presence by Updating Privacy Settings
Security Tips

Managing Your Digital Presence by Updating Privacy Settings

Do you still have a MySpace, or a Xanga? There are probably a few accounts out there that you no longer use – and probably didn’t remember you had. But they are still part of your digital presence and should be monitored. How do these old accounts pose a cybersecurity...
Read More
Battling the Myths of How Businesses Control Their IT Infrastructure
Infrastructure Managed Services

Battling the Myths of How Businesses Control Their IT Infrastructure

In order for businesses to stay ahead of the competition, they need to be innovative. One word that is often associated with being innovative is technology. A business’s technology stems directly from their IT infrastructure. This includes their server(s), hardware, technology, managed services, software, network, etc. In order to allow...
Read More
1 2 3 4
Skip to content