Blog

3 Things You MUST Know About Cloud Computing

Cloud computing provides solutions for businesses of all sizes. Small and large businesses need to be able to access information at any time and anywhere. According to our IT experts, moving to the cloud is critical for business success and security. Here are 3 things you MUST know about cloud computing if you are thinking about making the switch.

What Does it Mean to be Certified as an Ethical Hacker?

One of our core values is to grow. We are always striving to learn more and increase our capacity. One of the ways we do that at MIS is by advancing our education with personal certifications so that we can better serve our clients. 

Lliam Holmes, Founder, and CEO of MIS Solutions, holds several certifications, one of them being a Certified Ethical Hacker (CEH). Sounds intense.

Employee Resilience and Cloud Computing Rescues Puerto Rican Company in the Midst of Devastation

In 2017, Hurricane Maria unleashed a fury of destruction in Puerto Rico that had never been seen in the island’s recorded history. Almost 3,000 people died in the storm and its aftermath, making it the deadliest Atlantic hurricane since Mitch in 1998.

“I was in Atlanta but it was still a traumatic experience both on a professional and personal level,” said Janyra Perez.

Get to Know John Kavanaugh, Support Field Specialist

A quick, informal survey of John Kavanaugh’s teammates at MIS revealed that he is funny, energetic, helpful, personable and always willing to help others. Our clients will vouch for that, too. As one of our onsite support field specialists, he’s garnered a heap of praise from clients who have the pleasure of having him visit their offices and assist with technical issues.

Your Finance Team is Under Attack

How one simple administrative control could save you thousands from fake email scams
Your finance team is under attack. And if they are not prepared, your business could fall victim to the $12 billion email scam. That’s how much the FBI estimates has been stolen from U.S. companies in the past five years as a result of phishing attacks and business email compromise (BEC).

BEC is a tactic used by cybercriminals to steal the credentials of executives and C-suite personnel within a company.