Your Finance Team is Under Attack

How one simple administrative control could save you thousands from fake email scams Your finance team is under attack. And if they are not prepared, your business could fall victim to the $12 billion email scam. That’s how much the FBI estimates has been stolen from U.S. companies in the past five years as a […]

Meet Yogi, Our Pet of the Month

My name is Yogi!  My mom, Debbie Copeland of Preferred Aviation Underwriters, thought Yogi was the perfect name for me.  I am a Yorkinese, which means that I am part Yorkshire Terrier and part Pekinese.  I am almost 2-years-old and I have lived with my mom and dad since I was only 9-weeks-old. I also […]

Raising the Bar of Cybersecurity

Cloud Computing Allows Alabama State Bar to Strengthen Its Cybersecurity While Empowering Team Members to Easily Work from Home When you are the lone person responsible for managing an organization’s IT infrastructure and security, it can be a bit unnerving to have an outside vendor step in to help co-manage. But Hunter Harris felt it […]

8 Questions to Ask When Assessing Your IT

  Are you confident in your IT? When your technology fails you, you lose money. It’s important to be confident in your technology and the support you have backing up your technology. You shouldn’t have to worry about your network going down, losing data, or being hacked. Here are 8 questions to ask when assessing […]

Get to Know Gareth Ludeman, Escalations Engineer

Gareth Ludeman joined MIS in 2017 as a member of our Help Desk support team. He has since moved up and now serves as an Escalations Engineer. In both roles, he consistently makes raving fans out of folks who call in for technical support. He is part of MIS’s South African team that solves a […]

Top 4 Types of Phishing Attacks

  According to KnowBe4, the largest number of phishing sites were documented in 2020. Google’s Transparency Report stated that there were 2.1 million phishing sites last year, climbing 25% from the number of sites discovered in 2019. Therefore, it is extremely important to protect your business with proper safety measures and to be aware of […]

Facilitating Growth Through EOS

We began implementing the EOS model at MIS Solutions seven years ago. Using the EOS model sets us apart as a company because it allows us to focus on the value of setting up the proper processes to facilitate growth and foster healthy relationships with our clients. Here’s a deeper look into how we facilitate […]

Meet Maddie Mae, Our Pet of the Month

  Maddie Mae is a 5-month-old miniature dachshund who wiggled her way into the hearts of the Tecza family on Halloween last year. But there’s nothing spooky about this sweet little girl. According to her mom, Brittney of Century Displays, Maddie has a massive personality in a tiny little body. “She can’t stand to be […]

What to Know About Email Search Functions for E-Discovery

Occasionally clients will request assistance in locating electronically stored information (ESI) on their network. Many of those requests stem from the need to provide data essential for impending legal purposes such as insurance disputes and lawsuits. Examples of common ESI are emails, documents, audio/video files, faxes, etc. Retrieving ESI can be an arduous task for […]