www.teamlogicit.com
Open in
urlscan Pro
2606:4700:10::6816:1473
Public Scan
URL:
https://www.teamlogicit.com/longmontco612/Resources
Submission: On April 06 via manual from IN — Scanned from DE
Submission: On April 06 via manual from IN — Scanned from DE
Form analysis
1 forms found in the DOMPOST /longmontco612/Resources
<form method="post" action="/longmontco612/Resources" onsubmit="javascript:return WebForm_OnSubmit();" id="form">
<div class="aspNetHidden">
<input type="hidden" name="__CMSCsrfToken" id="__CMSCsrfToken" value="6F4ZRIiCVsYKCden7ixS9jxamSbQOVBWC88OkAUMV5B3sUkvR7E9dENjaCdL75jT6X5Qz2R2kVKoqQ52W2oJOl665oA=">
<input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="">
<input type="hidden" name="__EVENTARGUMENT" id="__EVENTARGUMENT" value="">
<input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE"
value="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">
</div>
<script type="text/javascript">
//<![CDATA[
var theForm = document.forms['form'];
if (!theForm) {
theForm = document.form;
}
function __doPostBack(eventTarget, eventArgument) {
if (!theForm.onsubmit || (theForm.onsubmit() != false)) {
theForm.__EVENTTARGET.value = eventTarget;
theForm.__EVENTARGUMENT.value = eventArgument;
theForm.submit();
}
}
//]]>
</script>
<script src="/WebResource.axd?d=pynGkmcFUV13He1Qd6_TZD3fbqDrhSr5fkttfSr2bS06sqgIafmKy6eTT-fz2VbH1i3ZOA2&t=637814365746327080" type="text/javascript"></script>
<input type="hidden" name="lng" id="lng" value="en-US">
<script type="text/javascript">
//<![CDATA[
function PM_Postback(param) {
if (window.top.HideScreenLockWarningAndSync) {
window.top.HideScreenLockWarningAndSync(1080);
}
if (window.CMSContentManager) {
CMSContentManager.allowSubmit = true;
};
__doPostBack('m$am', param);
}
function PM_Callback(param, callback, ctx) {
if (window.top.HideScreenLockWarningAndSync) {
window.top.HideScreenLockWarningAndSync(1080);
}
if (window.CMSContentManager) {
CMSContentManager.storeContentChangedStatus();
};
WebForm_DoCallback('m$am', param, callback, ctx, null, true);
}
//]]>
</script>
<script src="/ScriptResource.axd?d=nv7asgRUU0tRmHNR2D6t1Oii0eiQVv2KRQfFVZi55vpHEzjMy_0UQX_6789pcuRJ-oRyZXcFsXvYELTMeXeCYBUHOSUJBk_wbI466zqRcog0hSXOb5DUml1bxMmO8rXrWpRKHw2&t=14d69f50" type="text/javascript"></script>
<script src="https://www.google.com/recaptcha/api.js?onload=RenderRecaptchas&render=explicit&hl=en" async="async" defer="defer"></script>
<script type="text/javascript">
//<![CDATA[
var RenderRecaptchas = function() {
var captchas = document.getElementsByClassName('cms-recaptcha-wrap');
if (captchas.length > 0 && grecaptcha) {
Array.from(captchas).forEach(function(item) {
var renderSettings = item.getAttribute('data-rendersettings');
if (item.id && renderSettings && item.children.length == 0) {
grecaptcha.render(item.id, JSON.parse(renderSettings));
};
});
};
};
//]]>
</script>
<script src="/ScriptResource.axd?d=NJmAwtEo3Ipnlaxl6CMhvtCheKgi9_e6uppcTAPIOpWv161FpLGJO35DMx6NiPUHEQxf8HZDqD5sfLJy76_7vV6G_8wDUnPZXBXwiRBbnAT_2b61o8oAJkEWXj_EsvjJaW6IpSvPV4ryEHy1kQzQOygOJdU1&t=49337fe8" type="text/javascript"></script>
<script src="/ScriptResource.axd?d=dwY9oWetJoJoVpgL6Zq8OMBM7f6QfdHlMdFYrrr7thLsAaH6i-6gTfBkRjE7Z3eqJK7vOCM6GwFTJ_M5mZAGr788GVFaSMLpbYrHjGZPLvSQ7HaQ0ClYXHgGyZTA1OZzx05HReGp-lX43wdmwBhhG223hfY1&t=49337fe8" type="text/javascript"></script>
<script type="text/javascript">
//<![CDATA[
var CMS = CMS || {};
CMS.Application = {
"language": "en",
"imagesUrl": "/CMSPages/GetResource.ashx?image=%5bImages.zip%5d%2f",
"isDebuggingEnabled": false,
"applicationUrl": "/",
"isDialog": false,
"isRTL": "false"
};
//]]>
</script>
<script type="text/javascript">
//<![CDATA[
function WebForm_OnSubmit() {
if (typeof(ValidatorOnSubmit) == "function" && ValidatorOnSubmit() == false) return false;
return true;
}
//]]>
</script>
<div class="aspNetHidden">
<input type="hidden" name="__VIEWSTATEGENERATOR" id="__VIEWSTATEGENERATOR" value="A5343185">
<input type="hidden" name="__SCROLLPOSITIONX" id="__SCROLLPOSITIONX" value="0">
<input type="hidden" name="__SCROLLPOSITIONY" id="__SCROLLPOSITIONY" value="0">
</div>
<script type="text/javascript">
//<![CDATA[
Sys.WebForms.PageRequestManager._initialize('manScript', 'form', ['tp$lt$ctl05$WebPartZone$WebPartZone_zone$On_lineForm$sys_pnlUpdate', '', 'tp$lt$ctl03$pageplaceholder$p$lt$ctl02$ResourcesWithFiltering$upGatedContent', 'upGatedContent', 'tctxM',
''
], ['p$lt$ctl05$WebPartZone$WebPartZone_zone$On_lineForm', ''], [], 90, '');
//]]>
</script>
<div id="ctxM">
</div>
<div id="local" itemscope="" itemtype=" https://schema.org/ProfessionalService">
<header>
<section class="utility-nav">
<div class="container text-right">
<ul>
<li class="change-text-size">
<div class="text-size">Change Text Size:</div>
<div class="minus"> </div>
<div class="plus"> </div>
</li>
<li class="translator"><!--Translator-->
<div id="siteLangSelector" runat="server" visible="true">
<ul>
<li id="country">
<a class="languageTranslate skiptranslate" href="javascript:void(0)" id="languageTranslate"><span id="siteLangText">English</span> <span id="siteLangImg"><img alt="Language Flag" id="langFlag" src="/TeamlogicIT/media/country-flags/en.gif"></span> </a>
</li>
</ul>
<div class="googleLangTranslator">
<div id="google_translate_element" style="display: none;"> <div class="skiptranslate goog-te-gadget" dir="ltr" style="display: none;">
<div id=":0.targetLanguage" class="goog-te-gadget-simple" style="white-space: nowrap;"><img src="https://www.google.com/images/cleardot.gif" class="goog-te-gadget-icon" alt=""
style="background-image: url("https://translate.googleapis.com/translate_static/img/te_ctrl3.gif"); background-position: -65px 0px;"><span
style="vertical-align: middle;"><a aria-haspopup="true" class="VIpgJd-ZVi9od-xl07Ob-lTBxed" href="#"><span></span><img src="https://www.google.com/images/cleardot.gif" alt="" width="1" height="1"><span style="border-left: 1px solid rgb(187, 187, 187);"></span><img src="https://www.google.com/images/cleardot.gif" alt="" width="1" height="1"><span aria-hidden="true" style="color: rgb(118, 118, 118);">▼</span></a></span>
</div>
</div>
</div>
<script type="text/javascript">
function googleTranslateElementInit() {
new google.translate.TranslateElement({
pageLanguage: 'en',
layout: google.translate.TranslateElement.InlineLayout.SIMPLE
}, 'google_translate_element');
}
</script>
<script type="text/javascript" src="//translate.google.com/translate_a/element.js?cb=googleTranslateElementInit"></script>
</div>
<div class="language-table skiptranslate" id="language-table" style="display:none;">
<table border="0" cellpadding="0" cellspacing="0">
<tbody>
<tr valign="top">
<td>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="en"><span class="indicator">›</span><span class="text">English</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="ar"><span class="indicator">›</span><span class="text">Arabic</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="be"><span class="indicator">›</span><span class="text">Belarusian</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="kxd"><span class="indicator">›</span><span class="text">Brunei</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="bg"><span class="indicator">›</span><span class="text">Bulgarian</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="ca"><span class="indicator">›</span><span class="text">Catalan</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="zh-CN"><span class="indicator">›</span><span class="text">Chinese (Simplified)</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="zh-TW"><span class="indicator">›</span><span class="text">Chinese (Traditional)</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="hr"><span class="indicator">›</span><span class="text">Croatian</span></a></div>
</td>
<td class="goog-te-menu2-colpad"> </td>
<td>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="cs"><span class="indicator">›</span><span class="text">Czech</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="da"><span class="indicator">›</span><span class="text">Danish</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="nl"><span class="indicator">›</span><span class="text">Dutch</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="et"><span class="indicator">›</span><span class="text">Estonian</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="tl"><span class="indicator">›</span><span class="text">Filipino</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="fi"><span class="indicator">›</span><span class="text">Finnish</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="fr"><span class="indicator">›</span><span class="text">French</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="gl"><span class="indicator">›</span><span class="text">Galician</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="de"><span class="indicator">›</span><span class="text">German</span></a></div>
</td>
<td class="goog-te-menu2-colpad"> </td>
<td>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="el"><span class="indicator">›</span><span class="text">Greek</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="iw"><span class="indicator">›</span><span class="text">Hebrew</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="hu"><span class="indicator">›</span><span class="text">Hungarian</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="is"><span class="indicator">›</span><span class="text">Icelandic</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="hi"><span class="indicator">›</span><span class="text">Indian</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="id"><span class="indicator">›</span><span class="text">Indonesian</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="it"><span class="indicator">›</span><span class="text">Italian</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="ja"><span class="indicator">›</span><span class="text">Japanese</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="ko"><span class="indicator">›</span><span class="text">Korean</span></a></div>
</td>
<td class="goog-te-menu2-colpad"> </td>
<td>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="lv"><span class="indicator">›</span><span class="text">Latvian</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="lt"><span class="indicator">›</span><span class="text">Lithuanian</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="ms"><span class="indicator">›</span><span class="text">Malaysian</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="mt"><span class="indicator">›</span><span class="text">Maltese</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="no"><span class="indicator">›</span><span class="text">Norwegian</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="pl"><span class="indicator">›</span><span class="text">Polish</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="pt"><span class="indicator">›</span><span class="text">Portuguese</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="ro"><span class="indicator">›</span><span class="text">Romanian</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="ru"><span class="indicator">›</span><span class="text">Russian</span></a></div>
</td>
<td class="goog-te-menu2-colpad"> </td>
<td>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="sr"><span class="indicator">›</span><span class="text">Serbian</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="sk"><span class="indicator">›</span><span class="text">Slovak</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="sl"><span class="indicator">›</span><span class="text">Slovenian</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="af"><span class="indicator">›</span><span class="text">South African</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="es"><span class="indicator">›</span><span class="text">Spanish</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="sv"><span class="indicator">›</span><span class="text">Swedish</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="th"><span class="indicator">›</span><span class="text">Thai</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="tr"><span class="indicator">›</span><span class="text">Turkish</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="uk"><span class="indicator">›</span><span class="text">Ukrainian</span></a></div>
<div style="white-space: nowrap;"><a class="goog-te-menu2-item" href="javascript:void(0)" id="vi"><span class="indicator">›</span><span class="text">Vietnamese</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</div>
<!--END Translator-->
</li>
<li class="clientlogin" style="display: none;"><a href="">Client Login</a></li>
<li><a href="/longmontco612/Resources?type=blog">Blog</a></li>
</ul>
<div class="search">
<div aria-label="keyword search" class="search-button" tabindex="0"> </div>
<div id="p_lt_ctl00_SmartSearchBox_pnlSearch" class="searchBox" onkeypress="javascript:return WebForm_FireDefaultButton(event, 'p_lt_ctl00_SmartSearchBox_btnSearch')">
<label for="p_lt_ctl00_SmartSearchBox_txtWord" id="p_lt_ctl00_SmartSearchBox_lblSearch" style="display:none;">Search for:</label>
<input name="p$lt$ctl00$SmartSearchBox$txtWord" type="text" maxlength="1000" id="p_lt_ctl00_SmartSearchBox_txtWord" class="form-control">
<input type="submit" name="p$lt$ctl00$SmartSearchBox$btnSearch" value="Search"
onclick="javascript:WebForm_DoPostBackWithOptions(new WebForm_PostBackOptions("p$lt$ctl00$SmartSearchBox$btnSearch", "", true, "", "", false, false))" id="p_lt_ctl00_SmartSearchBox_btnSearch"
class="btn btn-default">
<div id="p_lt_ctl00_SmartSearchBox_pnlPredictiveResultsHolder" class="predictiveSearchHolder">
</div>
</div>
</div>
</div>
</section>
<nav>
<div class="container">
<div class="flex-container align-middle">
<a class="logo hide-for-large" href="/longmontco612"><img itemprop="logo" alt="teamlogic it logo" src="/TeamlogicIT/media/TLIT-Images/Global/c2c89e1.png"></a>
<div id="mobile-menu"><a>Menu</a></div>
<div class="mobile-menu">
<div role="menubar">
<ul id="mega-menu" class="local-menu" role="group">
<li class="logo show-for-large"><a href="/longmontco612"><img itemprop="logo" alt="teamlogic it logo" src="/TeamlogicIT/media/TLIT-Images/Global/TeamLogic-logo302x86_2x.png"></a></li>
<li class="has-drop" id="services">
<a aria-haspopup="true" aria-posinset="1" aria-setsize="5" class="mega-menu-link" role="menuitem" tabindex="0">Services</a>
<div class="droplet">
<a class="mega-menu-back-link large-margin-0" tabindex="0">Back</a>
<ul class="sub-menu">
<li><a href="/longmontco612/Services-Overview">Services Overview</a></li>
<li class="has-drop level0"> Managed IT Services <div class="overviewlink"><a href="/longmontco612/Services-Overview/Managed-IT-Services">Managed IT Services Overview</a></div>
<div class="sub-sub-menu">
<ul></ul>
</div>
</li>
<li class="has-drop level0"> Cloud Services <div class="overviewlink"><a href="/longmontco612/Services-Overview/Cloud-Services">Cloud Services Overview</a></div>
<div class="sub-sub-menu">
<ul>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Cloud-Services/Cloud-Migration-Management">
<a href="/longmontco612/Services-Overview/Cloud-Services#migration">Cloud Migration & Management</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Cloud-Services/Cloud-Backup-Storage"><a href="/longmontco612/Services-Overview/Cloud-Services#backup">Cloud Backup and Storage</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Cloud-Services/Cloud-Security"><a href="/longmontco612/Services-Overview/Cloud-Services#security">Cloud Security</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Cloud-Services/VoIP"><a href="/longmontco612/Services-Overview/Cloud-Services#voip">VoIP</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Cloud-Services/Office-365"><a href="/longmontco612/Services-Overview/Cloud-Services/Office-365">Office 365</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Cloud-Services/DaaS"><a href="/longmontco612/Services-Overview/Cloud-Services#Daas">DaaS / IaaS </a></li>
</ul>
</div>
</li>
<li class="has-drop level0"> Cybersecurity & Compliance <div class="overviewlink"><a href="/longmontco612/Services-Overview/Cybersecurity">Cybersecurity & Compliance Overview</a></div>
<div class="sub-sub-menu">
<ul>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Cybersecurity/Cybersecurity-Advanced-Solutions">
<a href="/longmontco612/Services-Overview/Cybersecurity/Cybersecurity-Advanced-Solutions">Cybersecurity Advanced Solutions </a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Cybersecurity/Cybersecurity-Essentials">
<a href="/longmontco612/Services-Overview/Cybersecurity/Cybersecurity-Essentials">Compliance & Regulatory Services</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Cybersecurity/HIPAA"><a href="/longmontco612/Services-Overview/Cybersecurity/HIPAA">HIPAA</a></li>
</ul>
</div>
</li>
<li class="has-drop level0"> Data Backup & Recovery <div class="overviewlink"><a href="/longmontco612/Services-Overview/Data-Backup-Recovery">Data Backup & Recovery Overview</a></div>
<div class="sub-sub-menu">
<ul>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Data-Backup-Recovery/Business-Continuity">
<a href="/longmontco612/Services-Overview/Data-Backup-Recovery#continuity">Business Continuity</a></li>
</ul>
</div>
</li>
<li class="has-drop level0"> Business Application Services <div class="overviewlink"><a href="/longmontco612/Services-Overview/Business-Application-Services">Business Application Services Overview</a></div>
<div class="sub-sub-menu">
<ul></ul>
</div>
</li>
<li class="has-drop level0"> Data / Voice / Connectivity <div class="overviewlink"><a href="/longmontco612/Services-Overview/Data-Voice-Connectivity">Data / Voice / Connectivity Overview</a></div>
<div class="sub-sub-menu">
<ul>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Data-Voice-Connectivity/Internet-Wireless-Networks">
<a href="/longmontco612/Services-Overview/Data-Voice-Connectivity#networks">Internet & Wireless Networks</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Data-Voice-Connectivity/SD-WAN"><a href="/longmontco612/Services-Overview/Data-Voice-Connectivity#sdwan">SD-WAN</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Data-Voice-Connectivity/Phone-Systems">
<a href="/longmontco612/Services-Overview/Data-Voice-Connectivity/Phone-Systems">Phone Systems </a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Data-Voice-Connectivity/Unified-Communications">
<a href="/longmontco612/Services-Overview/Data-Voice-Connectivity/Unified-Communications">Unified Communications</a></li>
</ul>
</div>
</li>
<li class="has-drop level0"> Business Risk Assessments <div class="overviewlink"><a href="/longmontco612/Services-Overview/Business-Risk-Assessments">Business Risk Assessments Overview</a></div>
<div class="sub-sub-menu">
<ul>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Business-Risk-Assessments/Network-Assessment">
<a href="/longmontco612/Services-Overview/Business-Risk-Assessments/Network-Assessment">Network Assessment</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Business-Risk-Assessments/Cloud-Readiness-Assessment">
<a href="/longmontco612/Services-Overview/Business-Risk-Assessments/Cloud-Readiness-Assessment">Cloud Readiness Assessment</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Business-Risk-Assessments/Cybersecurity-Assessment">
<a href="/longmontco612/Services-Overview/Business-Risk-Assessments/Cybersecurity-Assessment">Cybersecurity Assessment</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Business-Risk-Assessments/Wireless-Assessment">
<a href="/longmontco612/Services-Overview/Business-Risk-Assessments/Wireless-Assessment">Wireless Assessment</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Business-Risk-Assessments/IT-Downtime-Calculator">
<a href="/longmontco612/Services-Overview/Business-Risk-Assessments/IT-Downtime-Calculator">IT Downtime Calculator</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Business-Risk-Assessments/HIPAA-Assessment">
<a href="/longmontco612/Services-Overview/Business-Risk-Assessments/HIPAA-Assessment">HIPAA Assessment</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Business-Risk-Assessments/Compliance-Review">
<a href="/longmontco612/Services-Overview/Business-Risk-Assessments/Compliance-Review">Compliance Review</a></li>
</ul>
</div>
</li>
<li class="has-drop level0"> IT Projects & Support <div class="overviewlink"><a href="/longmontco612/Services-Overview/IT-Projects-Support">IT Projects & Support Overview</a></div>
<div class="sub-sub-menu">
<ul>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/IT-Projects-Support/IT-Consulting"><a href="/longmontco612/Services-Overview/IT-Projects-Support#consulting">IT Consulting</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/IT-Projects-Support/Co-Managed-IT-Services">
<a href="/longmontco612/Services-Overview/IT-Projects-Support/Co-Managed-IT-Services">Co-Managed Services</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/IT-Projects-Support/Remote-Workforce">
<a href="/longmontco612/Services-Overview/IT-Projects-Support/Remote-Workforce">Remote Workforce</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/IT-Projects-Support/IT-Procurement-Services">
<a href="/longmontco612/Services-Overview/IT-Projects-Support#procurement">IT Procurement Services</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/IT-Projects-Support/Structured-Cabling"><a href="/longmontco612/Services-Overview/IT-Projects-Support#cabling">Structured Cabling </a>
</li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/IT-Projects-Support/IT-Relocation-Services">
<a href="/longmontco612/Services-Overview/IT-Projects-Support#relocation">IT Relocation Services</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/IT-Projects-Support/Virtualization"><a href="/longmontco612/Services-Overview/IT-Projects-Support#virtualization">Virtualization</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/IT-Projects-Support/Server-Network-Design">
<a href="/longmontco612/Services-Overview/IT-Projects-Support#design">Server & Network Design</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/IT-Projects-Support/vCIO"><a href="/longmontco612/Services-Overview/IT-Projects-Support/vCIO">vCIO</a></li>
</ul>
</div>
</li>
<li class="has-drop level0"> Industries <div class="overviewlink"><a href="/longmontco612/Services-Overview/Industries">Industries Overview</a></div>
<div class="sub-sub-menu">
<ul>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Industries/Healthcare"><a href="/longmontco612/Services-Overview/Industries/Healthcare">Healthcare</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Industries/Legal-Services"><a href="/longmontco612/Services-Overview/Industries/Legal-Services">Legal Services</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Industries/Financial-Insurance"><a href="/longmontco612/Services-Overview/Industries/Financial-Insurance">Financial & Insurance</a>
</li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Industries/Manufacturing-Distribution">
<a href="/longmontco612/Services-Overview/Industries/Manufacturing-Distribution">Manufacturing & Distribution</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Industries/Non-Profit"><a href="/longmontco612/Services-Overview/Industries/Non-Profit">Non-Profit</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Industries/Construction-Contracting">
<a href="/longmontco612/Services-Overview/Industries/Construction-Contracting">Construction & Contracting</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Industries/Education"><a href="/longmontco612/Services-Overview/Industries/Education">Education</a></li>
<li class="service-sub-level" data-nodealiaspath="/longmontco612/Services-Overview/Industries/Accounting"><a href="/longmontco612/Services-Overview/Industries/Accounting">Accounting</a></li>
</ul>
</div>
</li>
</ul>
</div>
</li>
<li id="different"><a aria-haspopup="true" aria-posinset="2" aria-setsize="5" class="mega-menu-link" href="/longmontco612/Why-We-re-Different" role="menuitem" tabindex="0">Why We're Different </a></li>
<li class="has-drop" id="about"><a aria-haspopup="true" aria-posinset="3" aria-setsize="5" class="mega-menu-link" role="menuitem" tabindex="0"> About Us</a>
<div class="droplet">
<a class="mega-menu-back-link large-margin-0" tabindex="0">Back</a>
<ul class="sub-menu">
<li><a href="/longmontco612/About-Us">About TeamLogic IT</a></li>
<li><a href="/longmontco612/About-Us/Testimonials">Testimonials</a></li>
<li><a href="/longmontco612/About-Us/News">News & Accolades</a></li>
<li><a href="/longmontco612/About-Us/Certifications">Certifications</a></li>
<li><a href="https://teamlogic-it-longmont-co.careerplug.com/" target="_blank">Careers</a></li>
<li><a href="/longmontco612/About-Us/National-Accounts-Program">National Accounts Program</a></li>
</ul>
</div>
</li>
<li id="resources"><a aria-haspopup="true" aria-posinset="4" aria-setsize="5" class="mega-menu-link" role="menuitem" tabindex="0" href="/longmontco612/Resources"> Resources</a>
<!--<div class="droplet">
<a class="mega-menu-back-link large-margin-0" tabindex="0">Back</a>
<ul class="sub-menu"><li><a href="/longmontco612/Resources?topic=Business+Continuity">Business Continuity</a></li><li><a href="/longmontco612/Resources?topic=Cloud+Computing">Cloud Computing</a></li><li><a href="/longmontco612/Resources?topic=Compliance">Compliance</a></li><li><a href="/longmontco612/Resources?topic=Cybersecurity">Cybersecurity</a></li><li><a href="/longmontco612/Resources?topic=Information+Security">Information Security</a></li><li><a href="/longmontco612/Resources?topic=Managed+Services">Managed Services</a></li><li><a href="/longmontco612/Resources?topic=Mobility">Mobility</a></li><li><a href="/longmontco612/Resources?topic=Outsourcing+IT">Outsourcing IT</a></li><li><a href="/longmontco612/Resources?topic=Data/Voice/Connectivity">Data/Voice/Connectivity</a></li><li><a href="/longmontco612/Resources?topic=Trends">Trends</a></li><li><a href="/longmontco612/Resources?topic=Unified+Communications">Unified Communications</a></li><li><a href="/longmontco612/Resources?topic=Remote+workforce">Remote workforce</a></li><li><a href="/longmontco612/Resources?topic=Co-managed+IT+Services">Co-managed IT Services</a></li> </ul>
</div>-->
</li>
<li id="resources"><a aria-haspopup="true" aria-posinset="5" aria-setsize="5" class="mega-menu-link" href="/longmontco612/Support" role="menuitem" tabindex="0">Support </a></li>
<li id="contact"><a aria-haspopup="true" aria-posinset="6" aria-setsize="5" class="mega-menu-link button" href="/longmontco612/Contact-Us" role="menuitem" tabindex="0">Contact Us </a></li>
</ul>
</div>
<div class="mobile-menu-bottom">
<ul>
<li><a href="/longmontco612/Resources?type=blog">Blog</a></li>
<li class="clientlogin" style="display: none;"><a href="">Login</a></li>
<li class="padding-vertical-0">
<div class="grid-x align-middle">
<div class="cell small-6">Change Text Size:</div>
<div class="cell small-6 minus-and-plus change-text-size">
<div class="minus"> </div>
<div class="plus"> </div>
</div>
</div>
</li>
</ul>
</div>
</div>
</div>
</div>
</nav>
<section class="local-utility-nav">
<div class="container">
<div class="grid-x grid-margin-x">
<div class="cell auto">
<p class="like-h5 margin-bottom-0">Longmont, CO</p>
</div>
<div class="cell auto text-right">
<p class="like-h5 margin-bottom-0"><span class="margin-right-1"><a href="tel:720-927-5700">720-927-5700</a></span> <a class="button" href="/longmontco612/Request-A-Consultation">request a consultation </a></p>
</div>
</div>
</div>
</section>
</header>
<main>
<section class="hero small left">
<div class="desktop-background" style="background-image: url('/TeamlogicIT/media/TLIT-Images/Resources/TLIT-Resources-Hero.jpg?ext=.jpg');"></div>
<div class="mobile-background" style="background-image: url('/TeamlogicIT/media/TLIT-Images/Resources/TLIT-Resourcesl-Hero-Mobile.jpg?ext=.jpg');"></div>
<div class="content">
<h1>Resources</h1>
<p></p>
</div>
<div class="rays"></div>
</section>
<div class="section-padding-40 hide-for-large"></div>
<div class="container">
<section class="breadcrumbs">
<div class="grid-x container">
<div class="cell medium-auto resourcedetail">
<ul class="crumbs">
<li><a class="CMSBreadCrumbsLink" href="/longmontco612" data-length="3" data-level="1">Home</a> / <span>Resources</span></li>
</ul>
</div>
<div class="cell medium-auto text-right">
<ul class="social-links">
<li>Share</li>
<li>
<div class="sharethis-inline-share-buttons st-center st-inline-share-buttons st-animated" id="st-1">
<div class="st-btn st-first st-remove-label" data-network="email" style="display: inline-block;">
<img alt="email-white sharing button" src="https://platform-cdn.sharethis.com/img/email-white.svg">
</div>
<div class="st-btn st-remove-label" data-network="facebook" style="display: inline-block;">
<img alt="facebook-white sharing button" src="https://platform-cdn.sharethis.com/img/facebook-white.svg">
</div>
<div class="st-btn st-remove-label" data-network="twitter" style="display: inline-block;">
<img alt="twitter-white sharing button" src="https://platform-cdn.sharethis.com/img/twitter-white.svg">
</div>
<div class="st-btn st-last st-remove-label" data-network="print" style="display: none;">
<img alt="print-white sharing button" src="https://platform-cdn.sharethis.com/img/print-white.svg">
</div>
</div>
</li>
</ul>
</div>
</div>
</section>
</div>
<!-- jQuery Modal -->
<script src="https://cdnjs.cloudflare.com/ajax/libs/jquery-modal/0.9.1/jquery.modal.min.js"></script>
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/jquery-modal/0.9.1/jquery.modal.min.css">
<script type="text/javascript">
window.resources = {
"resources": [{
"download": "",
"id": "8caac43e-df21-49f2-b485-c10dc2abdfce",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity|Information Security",
"industry": "General-All",
"title": "Winning the IT ‘Transformation Race’",
"truncatedTitle": "Winning the IT ‘Transformation Race’ ",
"content": "<img alt=\"operationtransformation.jpg\" src=\"/getattachment/699dd46c-66de-403c-b89c-6b964228bc49/operationtransformation.jpg.aspx?width=300&height=212\" style=\"width: 300px; height: 212px; float: right;\" title=\"operationtransformation.jpg\" />COVID-era priorities proved businesses of all types and sizes could transform operations with digital technology at a rapid pace in the face of crisis. Now, despite waning pandemic conditions, pressure to accelerate digital transformation continues.<br />\r\n ",
"truncatedContent": "COVID-era priorities proved businesses of all types and sizes could transform operations with digital technology at a rapid pace in the face of crisis. ...",
"link": "/longmontco612/Resources/Winning-the-IT-Transformation-Race",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/71aed35e-c471-4b48-8ac5-afb7ff4cd83b/attachment.aspx",
"postDate": "4/4/2023 8:00:00 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/e324fc90-a082-4d40-8020-aa923d8b2d66/LogicalAdvantage_Apr2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "c165fdb1-58ab-4f61-bf2a-4be456f884b8",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "The Logical Advantage April 2023",
"truncatedTitle": "The Logical Advantage April 2023 ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/The-Logical-Advantage-April-2023",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "4/1/2023 8:00:00 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "65cf3779-c273-4512-a1e7-527c079758fe",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Phishing Season Never Ends",
"truncatedTitle": "Phishing Season Never Ends ",
"content": "<img alt=\"Phishing.jpg\" src=\"/getattachment/1bdbf6f2-3c70-4e82-a50b-a5d6bea8c249/Phishing.jpg.aspx?width=300&height=120\" style=\"width: 300px; height: 120px; float: right;\" title=\"Phishing.jpg\" />A big spike in phishing, the most prevalent form of business email compromise (BEC), occurred along with the rise in hybrid work arrangements. As more companies and employees embrace remote work arrangements, company communications may become more vulnerable to cybercriminals.",
"truncatedContent": "A big spike in phishing, the most prevalent form of business email compromise (BEC), occurred along with the rise in hybrid work arrangements. As more ...",
"link": "/longmontco612/Resources/Phishing-Season-Never-Ends",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/69c9a6df-2f61-461a-9963-4b3a99dd2d3b/attachment.aspx",
"postDate": "3/28/2023 7:54:12 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "d4ae8a8e-f0ad-4520-bad6-7edd6421baeb",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cloud Computing",
"industry": "General-All",
"title": "Cloud Continues as a Strategic Priority",
"truncatedTitle": "Cloud Continues as a Strategic Priority ",
"content": "More than three-quarters of finance leaders plan to continue investing in digital technologies this year, according to research from Gartner. These analysts predict CFOs will maintain or increase IT spending regardless of inflation levels or interest rate hikes. One area where CFOs plan to concentrate spending is in cloud solutions.<img alt=\"cloudcomputing.png\" src=\"/getattachment/c3ffbe7b-2c59-40de-bc70-b6bf1f0b2b75/cloudcomputing.png.aspx?width=300&height=155\" style=\"width: 300px; height: 155px; float: right;\" title=\"cloudcomputing.png\" /><br />\r\n ",
"truncatedContent": "More than three-quarters of finance leaders plan to continue investing in digital technologies this year, according to research from Gartner. These analysts ...",
"link": "/longmontco612/Resources/Cloud-Continues-as-a-Strategic-Priority",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/47702d5a-9f25-4585-b52a-5b7d31875479/attachment.aspx",
"postDate": "3/21/2023 11:48:20 AM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/TeamlogicIT/media/TLIT-Images/Resources/Info%20Sheets/ManagedITServicesinfoSheet_2023.pdf?ext=.pdf",
"id": "2364e6ba-dab9-4645-bb13-c2eeb3f16f81",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Managed Services",
"industry": "Legal Services",
"title": "Managed IT Services",
"truncatedTitle": "Managed IT Services ",
"content": "<p>Not a day goes by without technology impacting your business. Whether it’s email, servers or Internet access, you rely on it, plain and simple. </p>\r\n",
"truncatedContent": "Not a day goes by without technology impacting your business. Whether it’s email, servers or Internet access, you rely on it, plain and simple. \r\n ",
"link": "/longmontco612/Resources/Managed-IT-Services",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "3/14/2023 12:00:58 PM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Legal Services",
"link": "?industries=Legal Services"
}]
}, {
"download": "/TeamlogicIT/media/TLIT-Images/Resources/Info%20Sheets/Co-Managed-IT-Services_2023.pdf?ext=.pdf",
"id": "35194d24-97d8-41a1-9282-232540d49f04",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Co-managed IT Services",
"industry": "General-All",
"title": "Co-Managed IT Services",
"truncatedTitle": "Co-Managed IT Services ",
"content": "<p>Internal IT staff are spread thin and may not have the broad spectrum of skills required to keep up with the ever-evolving landscape of technology. What’s more, over employment in the IT workforce has made it difficult to recruit and retain technical resources creating exposure and risk for many organizations. </p>\r\n",
"truncatedContent": "Internal IT staff are spread thin and may not have the broad spectrum of skills required to keep up with the ever-evolving landscape of technology. What’s ...",
"link": "/longmontco612/Resources/Sometimes-a-Dedicated-Staff-Is-Not-Enough",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "3/14/2023 11:52:45 AM",
"tags": [{
"name": "Co-managed IT Services",
"link": "?topic=Co-managed IT Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/TeamlogicIT/media/TLIT-Images/Resources/Tip%20Sheets/basics_2023.pdf?ext=.pdf",
"id": "4b08f361-4229-4eab-b1cf-8ee797326932",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Tip Sheets",
"topic": "Cybersecurity",
"industry": "Healthcare",
"title": "Basic Cybersecurity Tactics for Monitoring and Maintenance",
"truncatedTitle": "Basic Cybersecurity Tactics for Monitoring ...",
"content": "<p>We have labeled today’s business security challenges a “cybersiege in the digital realm” because, for business leaders, the well-documented onslaught of cybercrime can certainly feel like one. To cope with ever-multiplying security risks, we advocate applying the Cybersecurity Framework developed by the National Institute of Standards and Technology (NIST).</p>\r\n",
"truncatedContent": "We have labeled today’s business security challenges a “cybersiege in the digital realm” because, for business leaders, the well-documented onslaught ...",
"link": "/longmontco612/Resources/Basic-Cybersecurity-Tactics-for-Monitoring-and-Mai",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "3/14/2023 11:10:08 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "/TeamlogicIT/media/TLIT-Images/Resources/Info%20Sheets/TLIT-Remote-Workforce-Info-Sheet_1.pdf?ext=.pdf",
"id": "f07dd02a-ff9b-4cc8-a5c9-e5d1f7332dc6",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Remote workforce",
"industry": "Education",
"title": "Remote Workforce IT Services",
"truncatedTitle": "Remote Workforce IT Services ",
"content": "<p>For many companies, working from home has become the new normal. Remote workers create new IT challenges and opportunities. That is why remote staff need a highly-available, highly-secure work environment to stay productive. </p>\r\n",
"truncatedContent": "For many companies, working from home has become the new normal. Remote workers create new IT challenges and opportunities. That is why remote staff ...",
"link": "/longmontco612/Resources/Remote-Workforce-IT-Services",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "3/14/2023 10:02:58 AM",
"tags": [{
"name": "Remote workforce",
"link": "?topic=Remote workforce"
}, {
"name": "Education",
"link": "?industries=Education"
}]
}, {
"download": "",
"id": "2652d942-b68e-4123-84e4-2feff004803c",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Considering Zero Trust?",
"truncatedTitle": "Considering Zero Trust? ",
"content": "Enterprises today have had to rethink how they apply security to their corporate network and, as a result, have decided to implement zero-trust principles. <img alt=\"zerotrust.png\" src=\"/getattachment/8aaa2dd7-301b-4cf3-9543-4b1d2c4be2e4/zerotrust.png.aspx?width=300&height=165\" style=\"width: 300px; height: 165px; float: right;\" title=\"zerotrust.png\" /><br />\r\n ",
"truncatedContent": "Enterprises today have had to rethink how they apply security to their corporate network and, as a result, have decided to implement zero-trust principles. \r\n ",
"link": "/longmontco612/Resources/Considering-Zero-Trust",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/40a60099-3bc7-4d66-a042-43fc14fc97cb/attachment.aspx",
"postDate": "3/14/2023 8:00:00 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/TeamlogicIT/media/TLIT-Images/Resources/Whitepapers/NewNormalWhitepaper_2023.pdf?ext=.pdf",
"id": "06160caf-6454-4b1c-9684-632914511265",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Briefs & Whitepapers",
"topic": "Remote workforce",
"industry": "General-All",
"title": "The New Normal IT Survival Guide",
"truncatedTitle": "The New Normal IT Survival Guide ",
"content": "Business as usual is no more. The traditional workplace has been transitioning for more than 30 years, with the advent of computers and a host of other innovations changing the way people work and what they do each day.",
"truncatedContent": "Business as usual is no more. The traditional workplace has been transitioning for more than 30 years, with the advent of computers and a host of other ...",
"link": "/longmontco612/Resources/Changing-Workplaces",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "3/13/2023 4:25:33 PM",
"tags": [{
"name": "Remote workforce",
"link": "?topic=Remote workforce"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "e2f06cbc-4590-4eb6-a229-5e4634695a85",
"isGated": true,
"isBlog": false,
"isFeatured": false,
"category": "Briefs & Whitepapers",
"topic": "Information Security",
"industry": "General-All",
"title": "Information Security: The Seven Signs Your Business May Be at Risk",
"truncatedTitle": "Information Security: The Seven Signs Your ...",
"content": "<p>Our ever increasing reliance on the internet is creating new challenges and threats that force organizations to continually rethink their protection measures.</p>\r\n",
"truncatedContent": "Our ever increasing reliance on the internet is creating new challenges and threats that force organizations to continually rethink their protection ...",
"link": "/longmontco612/Resources/Information-Security-The-Seven-Signs-Your-Business",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "3/13/2023 4:23:00 PM",
"tags": [{
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/TeamlogicIT/media/TLIT-Images/Resources/Whitepapers/CloudWhitepaper_2023.pdf?ext=.pdf",
"id": "8c4146e5-2d0b-46fd-aa7b-6172de12ca83",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Briefs & Whitepapers",
"topic": "Cloud Computing",
"industry": "General-All",
"title": "Leverage the Cloud to Strengthen Your Company’s Competitive Advantages",
"truncatedTitle": "Leverage the Cloud to Strengthen Your Company’s ...",
"content": "The cloud is a business enablement tool for the 21st century. Virtual applications are secure, flexible, scalable and allow employees to work anywhere at any time. These transformational business solutions allow the smallest organization to compete with even the largest, more advanced and better-funded adversaries.",
"truncatedContent": "The cloud is a business enablement tool for the 21st century. Virtual applications are secure, flexible, scalable and allow employees to work anywhere ...",
"link": "/longmontco612/Resources/Leverage-the-Cloud-to-Strengthen-Your-Company-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "3/13/2023 4:16:26 PM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/f5cdea71-0f19-41b2-abeb-1fdb12d78f53/BUDRWhitepaper_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "46f35abf-bf44-4081-9ef5-30be2fb87f91",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Briefs & Whitepapers",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "The Disaster Survival Guide for Small Businesses",
"truncatedTitle": "The Disaster Survival Guide for Small Businesses ",
"content": "The most valuable asset for many organizations today is the data stored in their computer systems. In the digital environment, information is money. This is one of many reasons why every organization needs a well-constructed and periodically tested plan to retrieve that precious data in the event of an outage or larger catastrophe.",
"truncatedContent": "The most valuable asset for many organizations today is the data stored in their computer systems. In the digital environment, information is money. ...",
"link": "/longmontco612/Resources/The-Disaster-Survival-Guide-for-Small-Businesses",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "3/13/2023 4:11:49 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "06369e90-e0c2-4dea-9762-4e5b374fd8ce",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Ransomware Risks Persist in 2023",
"truncatedTitle": "Ransomware Risks Persist in 2023 ",
"content": "Last month’s “ransomware and data exfiltration event” suffered by the U.S. Marshals Service was a stark reminder that cybersecurity threats continue as a significant risk to businesses of all kinds. <img alt=\"ransomware.jpg\" src=\"/getattachment/c0efe02c-c125-4ff5-b2a0-9f55d2f6ea07/ransomware.jpg.aspx?width=300&height=169\" style=\"width: 300px; height: 169px; float: right;\" title=\"ransomware.jpg\" />",
"truncatedContent": "Last month’s “ransomware and data exfiltration event” suffered by the U.S. Marshals Service was a stark reminder that cybersecurity threats continue ...",
"link": "/longmontco612/Resources/Ransomware-Risks-Persist-in-2023",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/60f24e0c-90d4-4165-b7f9-2a507fe07844/attachment.aspx",
"postDate": "3/7/2023 8:00:00 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "41858122-5b80-4ee9-b1f0-e7b8ab3da8fb",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "4 Essential Security Policies",
"truncatedTitle": "4 Essential Security Policies ",
"content": "<img alt=\"securityessentials.jpg\" src=\"/getattachment/8845fb36-12fc-4640-a6b5-d44366dc8c8e/securityessentials.jpg.aspx?width=300&height=200\" style=\"width: 300px; height: 200px; float: right;\" title=\"securityessentials.jpg\" />Disruption caused by breaches and the loss of critical data can cripple any company from big enterprises to SMBs. Case in point: The FBI’s Internet Crime Complaint Center received a record 847,376 complaints in 2021",
"truncatedContent": "Disruption caused by breaches and the loss of critical data can cripple any company from big enterprises to SMBs. Case in point: The FBI’s Internet Crime ...",
"link": "/longmontco612/Resources/4-Essential-Security-Policies-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/542c1232-c41d-453f-801c-2d3c7e92c49b/attachment.aspx",
"postDate": "2/28/2023 8:00:00 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "bce7ceed-0121-490e-b19b-86c20739c787",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Outsourcing IT|Co-managed IT Services",
"industry": "General-All",
"title": "Drive 2023 IT Efficiencies with an MSP",
"truncatedTitle": "Drive 2023 IT Efficiencies with an MSP ",
"content": "<img alt=\"Efficiency-business.jpg\" src=\"/getattachment/b5358e3a-fcff-4d07-be04-f490e09d06e2/Efficiency-business.jpg.aspx?width=300&height=221\" style=\"width: 300px; height: 221px; float: right;\" title=\"Efficiency-business.jpg\" />Market forecasters like Gartner expect IT spending will continue to rise in 2023, predicting growth rates ranging from 3% to 5%. One of the primary drivers of this expansion remains digital integration (often called “digital transformation”) strategies, as businesses large and small invest in technology to improve operating efficiencies.",
"truncatedContent": "Market forecasters like Gartner expect IT spending will continue to rise in 2023, predicting growth rates ranging from 3% to 5%. One of the primary drivers ...",
"link": "/longmontco612/Resources/Drive-2023-IT-Efficiencies-with-an-MSP-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/aaf9a312-4256-47c1-b39a-ac70e067cf8d/attachment.aspx",
"postDate": "2/21/2023 8:00:00 AM",
"tags": [{
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "Co-managed IT Services",
"link": "?topic=Co-managed IT Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "d2eb1db0-5054-44c0-847b-592f714ee3dc",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Managed Services",
"industry": "General-All",
"title": "Are You Supporting Hybrid Workers?",
"truncatedTitle": "Are You Supporting Hybrid Workers? ",
"content": "<img alt=\"hybridworkers.jpg\" src=\"/getattachment/a3c6d968-f3c1-4ed3-a505-a5f87ab7f393/hybridworkers.jpg.aspx?width=300&height=200\" style=\"width: 300px; height: 200px; float: right;\" title=\"hybridworkers.jpg\" />During the height of the pandemic, a Stanford study discovered that nearly half (42%) of U.S. workers were working from home, accounting for more than two-thirds of the nation’s economic activity.<br />\r\n ",
"truncatedContent": "During the height of the pandemic, a Stanford study discovered that nearly half (42%) of U.S. workers were working from home, accounting for more than ...",
"link": "/longmontco612/Resources/Are-You-Supporting-Hybrid-Workers",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/c0b5b73f-58b0-4316-84e9-5f45af25e1b5/attachment.aspx",
"postDate": "2/14/2023 8:00:00 AM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "a1fa7718-a048-4a24-8930-630994955121",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Trends",
"industry": "General-All",
"title": "Digital Investments Support Growth",
"truncatedTitle": "Digital Investments Support Growth ",
"content": "<img alt=\"digitalinvesting.jpg\" src=\"/getattachment/c787f9d7-6b99-4a4a-b83c-d17efaece80c/digitalinvesting.jpg.aspx?width=300&height=200\" style=\"width: 300px; height: 200px; float: left;\" title=\"digitalinvesting.jpg\" />Despite economic concerns and uncertain indicators, business leaders worldwide intend to continue investing in the coming months in digital initiatives with “market-facing, growth impact.”",
"truncatedContent": "Despite economic concerns and uncertain indicators, business leaders worldwide intend to continue investing in the coming months in digital initiatives ...",
"link": "/longmontco612/Resources/Digital-Investments-Support-Growth-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/9ce79f41-b342-4417-8456-9bd0f4f4f864/attachment.aspx",
"postDate": "2/7/2023 7:24:48 AM",
"tags": [{
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "04c32d12-f4a2-4c11-8421-88d24d5afd7f",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Cybersecurity: Your Hedge Against Rising Insurance Rates",
"truncatedTitle": "Cybersecurity: Your Hedge Against Rising ...",
"content": "Accelerated by the pandemic, the rate of cybercrime continues to rise across all industry verticals, and the cost to companies of all types and sizes is escalating along with it.<br />\r\n<img alt=\"cybersecurity-1.jpg\" src=\"/getattachment/93d994ef-e0fa-4649-a6b6-ade4436271d9/cybersecurity-1.jpg.aspx?width=300&height=200\" style=\"width: 300px; height: 200px;\" title=\"cybersecurity-1.jpg\" />",
"truncatedContent": "Accelerated by the pandemic, the rate of cybercrime continues to rise across all industry verticals, and the cost to companies of all types and sizes ...",
"link": "/longmontco612/Resources/Cybersecurity-Your-Hedge-Against-Rising-Insurance",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/7680246d-708a-4cf7-acaa-7b1ba69c2985/attachment.aspx",
"postDate": "1/31/2023 8:00:00 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "3a28a3c2-dce7-464c-901c-5baf5c6e389e",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Remote workforce",
"industry": "General-All",
"title": "Checklist for a Remote Workforce",
"truncatedTitle": "Checklist for a Remote Workforce ",
"content": "<p><img alt=\"remotework-1.jpg\" src=\"/getattachment/5a75299c-a9cd-4e3b-b71d-12e86e60c530/remotework-1.jpg.aspx?width=300&height=200\" style=\"width: 300px; height: 200px; float: left;\" title=\"remotework-1.jpg\" />Having dispersed, remote workforces has become the new normal for many businesses. It’s become an almost seamless practice, thanks to technology advancements. But information security best practices must always be observed to ensure you’re providing a highly secure and stable environment for your remote workers as well as your business.</p>\r\n",
"truncatedContent": "Having dispersed, remote workforces has become the new normal for many businesses. It’s become an almost seamless practice, thanks to technology advancements. ...",
"link": "/longmontco612/Resources/Checklist-for-a-Remote-Workforce",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/9f0f6868-fadc-43e8-b65a-09bf88a21fcd/attachment.aspx",
"postDate": "1/24/2023 8:00:00 AM",
"tags": [{
"name": "Remote workforce",
"link": "?topic=Remote workforce"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "236a050a-a48f-4a8d-9408-3a276ba130b2",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Cybersecurity Persists as Priority",
"truncatedTitle": "Cybersecurity Persists as Priority ",
"content": "<em>If you feel like your business is struggling to keep pace with cybersecurity, you’re not alone.<img alt=\"cybersecurity-min.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Cybersecurity-Persists-as-Priority/cybersecurity-min.jpg.aspx?width=128&height=71\" style=\"width: 128px; height: 71px; float: right;\" title=\"cybersecurity-min.jpg\" /></em><br />\r\n ",
"truncatedContent": "If you feel like your business is struggling to keep pace with cybersecurity, you’re not alone.\r\n ",
"link": "/longmontco612/Resources/Cybersecurity-Persists-as-Priority",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/3289a2d4-b3cd-4654-81e0-8fba2baedbda/attachment.aspx",
"postDate": "1/17/2023 9:33:33 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/How-Technology-Reaching-End-of-Service-Can-Impact/EoL-EoS-Checklist_2023_edit.pdf.aspx?lang=en-US&ext=.pdf",
"id": "28920b07-a864-4673-af5f-4137819f686a",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Tip Sheets",
"topic": "Business Continuity|Trends",
"industry": "General-All",
"title": "How Technology Reaching End of Service Can Impact Your Business",
"truncatedTitle": "How Technology Reaching End of Service ...",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/How-Technology-Reaching-End-of-Service-Can-Impact",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "1/17/2023 8:52:15 AM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "ce741177-3443-4460-8b02-74376879ec7f",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "“Tightly Aligned” Cybersecurity Training",
"truncatedTitle": "“Tightly Aligned” Cybersecurity Training ",
"content": "<img alt=\"cybersecurity-copy-2.jpeg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Tightly-Aligned-Cybersecurity-Training/cybersecurity-copy-2.jpeg.aspx?width=300&height=200\" style=\"width: 300px; height: 200px; float: left;\" title=\"cybersecurity-copy-2.jpeg\" /> In today’s expanding remote working environment, it’s not surprising that employees often make cybersecurity missteps.",
"truncatedContent": " In today’s expanding remote working environment, it’s not surprising that employees often make cybersecurity missteps. ",
"link": "/longmontco612/Resources/Tightly-Aligned-Cybersecurity-Training",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/bbcde6ed-6bce-4dc9-b0d4-bb74d7ebdc04/attachment.aspx",
"postDate": "1/10/2023 9:43:29 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "184b574e-51d4-428b-ae37-f8bab4e456fb",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Containing Breach Costs with Zero Trust",
"truncatedTitle": "Containing Breach Costs with Zero Trust ",
"content": "The economic impact of protecting data cannot be measured solely with traditional financial metrics. The real impact is far more wide reaching<img alt=\"hackers.jpeg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Tightly-Aligned-Cybersecurity-Training-1-1-1-1-1/hackers.jpeg.aspx?width=300&height=158\" style=\"width: 300px; height: 158px; float: right;\" title=\"hackers.jpeg\" />",
"truncatedContent": "The economic impact of protecting data cannot be measured solely with traditional financial metrics. The real impact is far more wide reaching ",
"link": "/longmontco612/Resources/Tightly-Aligned-Cybersecurity-Training-1-1-1-1-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/53d3530e-7bcf-4aa9-ac4e-09f7f2a51bfe/attachment.aspx",
"postDate": "1/3/2023 8:00:36 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "958e7b6e-6142-4d7c-9b1b-7601c0d06509",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Managed Services",
"industry": "General-All",
"title": "How a Virtual CIO (vCIO) Drives Strategic Growth",
"truncatedTitle": "How a Virtual CIO (vCIO) Drives Strategic ...",
"content": "<img alt=\"GettyImages-168386317-1.jpg\" src=\"/getattachment/f1664655-e32e-4bbd-b003-797d5c7d2131/GettyImages-168386317-1.jpg.aspx?width=300&height=224\" style=\"width: 300px; height: 224px;\" title=\"GettyImages-168386317-1.jpg\" />Nearly three-quarters of technology and business professionals rate digital solutions as a primary factor in achieving strategic objectives, according to research by tech trade group CompTIA.",
"truncatedContent": "Nearly three-quarters of technology and business professionals rate digital solutions as a primary factor in achieving strategic objectives, according ...",
"link": "/longmontco612/Resources/How-a-Virtual-CIO-vCIO-Drives-Strategic-Growth",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/23b14512-5992-4cdd-adce-4c7b67f331ff/attachment.aspx",
"postDate": "12/20/2022 8:30:59 AM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "32b7e400-4d8a-4f5a-9369-f1c7e4295b63",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Cyber Defense Remains an SMB Priority",
"truncatedTitle": "Cyber Defense Remains an SMB Priority ",
"content": "<img alt=\"CybersecurityAssessment-360x209-min.jpeg\" src=\"/getattachment/d50a4a30-eae3-44bf-8c66-d98dafdbc327/CybersecurityAssessment-360x209-min.jpeg.aspx?width=300&height=200\" style=\"width: 300px; height: 200px;\" title=\"CybersecurityAssessment-360x209-min.jpeg\" />Cybersecurity remains among the highest priorities for businesses around the globe as financial damages from cybercrime escalate.<br />\r\n ",
"truncatedContent": "Cybersecurity remains among the highest priorities for businesses around the globe as financial damages from cybercrime escalate.\r\n ",
"link": "/longmontco612/Resources/Cyber-Defense-Remains-an-SMB-Priority",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/06d620fb-a7c9-4f0f-9a05-653da37678d6/attachment.aspx",
"postDate": "12/13/2022 2:28:33 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/c99e7fca-f262-4df0-ba24-2297722dfdd4/WirelessNetworkInfoSheet_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "aa6651d0-2a5c-4f04-bbb8-7b3f1c26712b",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Co-managed IT Services",
"industry": "General-All",
"title": "Wireless Network Services and Support 2023",
"truncatedTitle": "Wireless Network Services and Support 2023 ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/Wireless-Network-Services-and-Support-2023",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/13/2022 11:28:41 AM",
"tags": [{
"name": "Co-managed IT Services",
"link": "?topic=Co-managed IT Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/3eec6602-cafd-4daf-bf3f-12321dbd1a43/TechProcurement_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "93551022-e795-45e4-9989-66c0f364755b",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Co-managed IT Services",
"industry": "General-All",
"title": "Technology Procurement 2023",
"truncatedTitle": "Technology Procurement 2023 ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/Technology-Procurement-2023",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/13/2022 11:25:52 AM",
"tags": [{
"name": "Co-managed IT Services",
"link": "?topic=Co-managed IT Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/4ab39282-56ee-49d2-9eca-a8f5df7b9f9e/ServerInstallationAndSupportInfoSheet_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "66549131-4aa7-4b87-81da-fc27a2cef5ce",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Managed Services",
"industry": "General-All",
"title": "Server Installation And Support 2023",
"truncatedTitle": "Server Installation And Support 2023 ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/Server-Installation-And-Support-2023",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/13/2022 11:24:03 AM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/85e4e2c6-bb38-4cb8-81a1-3286e83cb5b6/RelocationServicesInfoSheet_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "d2247cbb-2636-478e-8f0d-4282615e16f3",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Outsourcing IT",
"industry": "General-All",
"title": "IT Relocation Services 2023",
"truncatedTitle": "IT Relocation Services 2023 ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/IT-Relocation-Services-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/13/2022 11:16:54 AM",
"tags": [{
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/1018c6df-5e8d-43cd-b107-4c37c5c5d8e9/OutsourcedITServicesInfoSheet_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "0abc2e39-b97e-4055-8497-e2a56d061f4e",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Outsourcing IT",
"industry": "General-All",
"title": "Outsourced IT Services 2023",
"truncatedTitle": "Outsourced IT Services 2023 ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/Outsourced-IT-Services-2023",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/13/2022 11:10:30 AM",
"tags": [{
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/feff0efb-8d4c-4106-896a-7df4806b0255/NetworkConfigurationInfoSheet_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "849d30ad-c0e6-437d-8df5-9b240b4c0a05",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Data/Voice/Connectivity",
"industry": "General-All",
"title": "Networking Design and Configuration Service 2023",
"truncatedTitle": "Networking Design and Configuration Service ...",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/Networking-Design-and-Configuration-Service-2023",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/13/2022 11:07:13 AM",
"tags": [{
"name": "Data/Voice/Connectivity",
"link": "?topic=Data/Voice/Connectivity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/04ea77c5-a60b-4497-a0ac-fdb086900dfb/NationalAccountsInfoSheet_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "7c5867eb-3ec5-40e2-8b6f-7bf000de20c4",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Business Continuity|Information Security",
"industry": "General-All",
"title": "National Account Program 2023",
"truncatedTitle": "National Account Program 2023 ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/National-Account-Program-2023",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/13/2022 11:05:08 AM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/97b6274b-6219-4655-9396-74b2a5bca8cc/MobilityServicesInfoSheet_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "1246dcaa-4038-47d2-9f5f-69c9ab3e19a2",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Mobility",
"industry": "General-All",
"title": "Mobility Services 2023",
"truncatedTitle": "Mobility Services 2023 ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/Mobility-Services-2023",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/13/2022 11:03:11 AM",
"tags": [{
"name": "Mobility",
"link": "?topic=Mobility"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/0fe6af24-79e5-4ab2-8ed0-a5a2be1cae75/MacSupportInfoSheet_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "7b1e5b7c-60be-45cf-a89e-5c8d40b537c8",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Co-managed IT Services",
"industry": "General-All",
"title": "Mac Support Services 2023",
"truncatedTitle": "Mac Support Services 2023 ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/Mac-Support-Services-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/13/2022 10:57:06 AM",
"tags": [{
"name": "Co-managed IT Services",
"link": "?topic=Co-managed IT Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/131fe372-3db2-48e6-bee8-fcf558aa822e/ITServicesInfoSheet_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "517e64bc-696b-4408-ba1c-246b0bf55b8f",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Outsourcing IT",
"industry": "General-All",
"title": "IT Services 2023",
"truncatedTitle": "IT Services 2023 ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/IT-Services-2023",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/13/2022 10:49:47 AM",
"tags": [{
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/9fd6bd79-617a-44be-8242-1f2645b217cd/HelpDeskInfoSheet_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "5bedbfac-d5e6-4e22-8fee-1f1743d3baf2",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Information Security",
"industry": "General-All",
"title": "Help Desk Services 2023",
"truncatedTitle": "Help Desk Services 2023 ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/Help-Desk-Services-2023",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/13/2022 10:47:55 AM",
"tags": [{
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/e7e5c1d6-7864-46d8-95f4-398baf2330eb/DataVoiceConnectivity_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "ed21a6da-4ee6-4647-85d9-68b6311c8e58",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Data/Voice/Connectivity",
"industry": "General-All",
"title": "Data Voice Connectivity 2023",
"truncatedTitle": "Data Voice Connectivity 2023 ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/Data-Voice-Connectivity-2023",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/13/2022 10:44:42 AM",
"tags": [{
"name": "Data/Voice/Connectivity",
"link": "?topic=Data/Voice/Connectivity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/8fccc402-3edd-4c5a-bb0d-d9ce4b0263a0/DataBackUpRecoveryInfoSheet_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "393c3504-ce95-4da7-9d85-f7324e6a1bb7",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Data/Voice/Connectivity",
"industry": "General-All",
"title": "Data Backup & Recovery 2023",
"truncatedTitle": "Data Backup & Recovery 2023 ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/Data-Backup-Recovery-2023",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/13/2022 10:42:43 AM",
"tags": [{
"name": "Data/Voice/Connectivity",
"link": "?topic=Data/Voice/Connectivity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/d68ff896-43ba-4257-a2e4-c9f2570d5170/CybersecurityAssessmentInfoSheet_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "5164eca4-5a71-4aa0-89cf-deaace34c0da",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Cybersecurity Assessment 2023",
"truncatedTitle": "Cybersecurity Assessment 2023 ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/Cybersecurity-Assessment-2023",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/13/2022 10:38:50 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/ae47cafc-7aa0-4fbe-9eff-b62d5cdc95ad/CybersecurityInfoSheet_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "d1785ce2-04bb-4746-a685-5df44e8680b4",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Cybersecurity Services 2023",
"truncatedTitle": "Cybersecurity Services 2023 ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/Cybersecurity-Services-2023",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/13/2022 10:36:22 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/58389d8a-32ab-4441-b61c-2f01e4e5d20f/ComputerMaintenanceInfoSheet_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "b1e37ed7-8805-42de-ad55-4090d0edef11",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Managed Services",
"industry": "General-All",
"title": "Computer Maintenance 2023",
"truncatedTitle": "Computer Maintenance 2023 ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/Computer-Maintenance-2023",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/13/2022 10:24:33 AM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/6010c145-e9da-41d2-b2c8-2979b7811309/CoManagedITInfoSheet_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "ef83b2ad-f30f-46f5-a96e-a7e014caf2b7",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Co-managed IT Services",
"industry": "General-All",
"title": "Co-Managed IT Services 2023",
"truncatedTitle": "Co-Managed IT Services 2023 ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/Co-Managed-IT-Services-2023",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/13/2022 10:20:39 AM",
"tags": [{
"name": "Co-managed IT Services",
"link": "?topic=Co-managed IT Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/a73906f1-f4a0-46a6-957b-30f0d3ec9b55/CloudServicesInfoSheet_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "8cc0dd24-be6f-4864-9a69-013e2adf665c",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Cloud Computing",
"industry": "General-All",
"title": "Cloud Services 2023",
"truncatedTitle": "Cloud Services 2023 ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/Cloud-Services-2023",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/13/2022 10:18:41 AM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/108d4395-c5dc-49c4-959d-e8634394c9d5/CloudAssessmentInfoSheet_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "d11a54ba-c2a4-462c-a0fb-b8aa4c3c5f3d",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Cloud Computing",
"industry": "General-All",
"title": "Cloud Services Readiness Assessment 2023",
"truncatedTitle": "Cloud Services Readiness Assessment 2023 ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/Cloud-Services-Readiness-Assessment-2023",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/13/2022 10:16:46 AM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/84cb093e-3143-4374-ae10-a61fa698fb95/BusinessContinuityInfoSheet_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "0f934182-e9af-40f4-a5da-e33991125842",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Business Continuity",
"industry": "General-All",
"title": "Business Continuity 2023",
"truncatedTitle": "Business Continuity 2023 ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/Business-Continuity-2023",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/13/2022 10:13:09 AM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/90b0d8ae-f077-4f90-a665-cdf8f6cfff92/TLIT-Backup-And-Recovery_CaseStudy_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "8b47faf1-6061-4be0-86ee-8e61b94449f2",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Trends",
"industry": "General-All",
"title": "A Case Study in Backup and Disaster Recovery 2023",
"truncatedTitle": "A Case Study in Backup and Disaster Recovery ...",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/A-Case-Study-in-Backup-and-Disaster-Recovery-2023",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/13/2022 9:05:32 AM",
"tags": [{
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "927bfb52-0507-4ccf-9a4d-0e06c4473bf7",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Remote workforce",
"industry": "General-All",
"title": "Checklists for Supporting Hybrid Workers",
"truncatedTitle": "Checklists for Supporting Hybrid Workers ",
"content": "<img alt=\"Website_Design_ImageRow-1.jpg\" src=\"/getattachment/c33c47ac-9761-4955-ba88-3b680ed3b35f/Website_Design_ImageRow-1.jpg.aspx?width=300&height=200\" style=\"width: 300px; height: 200px;\" title=\"Website_Design_ImageRow-1.jpg\" />During the height of the pandemic, researchers at Stanford’s Institute for Economic Policy Research discovered that nearly half (42%) of U.S. workers were working from home",
"truncatedContent": "During the height of the pandemic, researchers at Stanford’s Institute for Economic Policy Research discovered that nearly half (42%) of U.S. workers ...",
"link": "/longmontco612/Resources/Checklists-for-Supporting-Hybrid-Workers",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/75f8dd58-9819-4f95-b6f5-2d47f54a7a9f/attachment.aspx",
"postDate": "12/6/2022 2:24:31 PM",
"tags": [{
"name": "Remote workforce",
"link": "?topic=Remote workforce"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "f5aa1f67-ba63-42a8-bc88-afcd11aeb6d9",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Cybersecurity|Information Security|Outsourcing IT|Trends",
"industry": "General-All",
"title": "The Logical Advantage December 2022",
"truncatedTitle": "The Logical Advantage December 2022 ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/The-Logical-Advantage-December-2022",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/1/2022 7:41:09 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "53444e50-4ff7-468f-8629-80f9ec28fd2f",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Outsourcing IT|Trends",
"industry": "General-All",
"title": "Drive 2023 IT Efficiencies with an MSP",
"truncatedTitle": "Drive 2023 IT Efficiencies with an MSP ",
"content": "<img alt=\"IT-efficencies.jpg\" src=\"/getattachment/608d5de0-d770-4244-b175-06d1b48590a1/IT-efficencies.jpg.aspx?width=300&height=182\" style=\"width: 300px; height: 182px; float: right;\" title=\"IT-efficencies.jpg\" />Market forecasters like Gartner expect IT spending will continue to rise in 2023, predicting growth rates ranging from 3% to 5%. One of the primary drivers of this expansion remains digital integration (often called “digital transformation”) strategies, as businesses large and small invest in technology to improve operating efficiencies.<br />\r\n ",
"truncatedContent": "Market forecasters like Gartner expect IT spending will continue to rise in 2023, predicting growth rates ranging from 3% to 5%. One of the primary drivers ...",
"link": "/longmontco612/Resources/Drive-2023-IT-Efficiencies-with-an-MSP",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/611da635-99d9-46f0-9d46-7bc1c57e5e60/attachment.aspx",
"postDate": "11/29/2022 7:45:42 AM",
"tags": [{
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "bcd180b1-712d-45c7-9a76-6adfce93f93b",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Managed Services|Co-managed IT Services",
"industry": "General-All",
"title": "Digital Investments Support Growth",
"truncatedTitle": "Digital Investments Support Growth ",
"content": "<img alt=\"digital-investments.jpg\" src=\"/getattachment/59813fb7-472a-4a5a-ae09-b4f7bed26a16/digital-investments.jpg.aspx?width=300&height=206\" style=\"width: 300px; height: 206px; float: left;\" title=\"digital-investments.jpg\" />Despite economic concerns and uncertain indicators, business leaders worldwide intend to continue investing in the coming months in digital initiatives with “market-facing, growth impact.” This is a primary takeaway from research by tech analyst Gartner.",
"truncatedContent": "Despite economic concerns and uncertain indicators, business leaders worldwide intend to continue investing in the coming months in digital initiatives ...",
"link": "/longmontco612/Resources/Digital-Investments-Support-Growth",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/6ea08345-73fa-4805-92d4-81112f0d03f5/attachment.aspx",
"postDate": "11/22/2022 7:41:20 AM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Co-managed IT Services",
"link": "?topic=Co-managed IT Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/8fbaf81d-2a46-413e-a9ec-ca8b88df2d64/2022-Blackpoint-Cyber-FTC-Safeguard-Rule-Guide.pdf.aspx?lang=en-US&ext=.pdf",
"id": "1789c8d2-4577-434e-b375-0a4b86b3c734",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Cybersecurity",
"industry": "Automotive",
"title": "Safeguard Your Dealership With Our Blackpoint Cyber-Powered Security Stack",
"truncatedTitle": "Safeguard Your Dealership With Our Blackpoint ...",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/Safeguard-Your-Dealership-With-Our-Blackpoint-Cybe",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "11/16/2022 9:40:22 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Automotive",
"link": "?industries=Automotive"
}]
}, {
"download": "",
"id": "f721a4d1-9d4f-4b4a-8145-aab5ccd23f84",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Business Continuity|Trends|Remote workforce",
"industry": "General-All",
"title": "4 Questions for Crafting BUDR Strategy",
"truncatedTitle": "4 Questions for Crafting BUDR Strategy ",
"content": "<img alt=\"hurricane.jpg\" src=\"/getattachment/f2569803-e1c5-4005-8ed4-acd130b71015/hurricane.jpg.aspx?width=300&height=204\" style=\"width: 300px; height: 204px; float: left;\" title=\"hurricane.jpg\" />When we think of IT emergencies and disaster recovery, we often think of weather-related events such as the late-season hurricanes that have targeted Florida. But every company, no matter your risk for natural disasters, needs to prioritize what the tech industry calls BUDR, which stands for “backup and disaster recovery.”<br />\r\n ",
"truncatedContent": "When we think of IT emergencies and disaster recovery, we often think of weather-related events such as the late-season hurricanes that have targeted ...",
"link": "/longmontco612/Resources/4-Questions-for-Crafting-BUDR-Strategy",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/5c6dbd0c-57f8-457b-88ca-44dcd47aafdd/attachment.aspx",
"postDate": "11/15/2022 8:00:18 AM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "Remote workforce",
"link": "?topic=Remote workforce"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "80fbdd22-e194-4747-bdc1-a69db8408195",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Combat Cybercrime with ‘3 Es of Cybersecurity’",
"truncatedTitle": "Combat Cybercrime with ‘3 Es of Cybersecurity’ ",
"content": "<img alt=\"pexels-tima-miroshnichenko-5380792-1.jpg\" src=\"/getattachment/fc1f6d6c-fdc2-4b64-96b9-4aaf4f7e4fd8/pexels-tima-miroshnichenko-5380792-1.jpg.aspx?width=300&height=199\" style=\"width: 300px; height: 199px; float: left;\" title=\"pexels-tima-miroshnichenko-5380792-1.jpg\" />While massive data breaches at large organizations grab headlines, small- to midsize businesses (SMBs) have become an increasingly popular target for cybercrooks.",
"truncatedContent": "While massive data breaches at large organizations grab headlines, small- to midsize businesses (SMBs) have become an increasingly popular target for ...",
"link": "/longmontco612/Resources/Combat-Cybercrime-with-3-Es-of-Cybersecurity",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/a076dd53-d698-4bea-9119-d8047644fcfd/attachment.aspx",
"postDate": "11/8/2022 4:22:15 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "e9b0413e-d928-4201-8ede-504c1fdb037f",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Business Continuity|Compliance|Trends",
"industry": "General-All",
"title": "4 Tech Planning Priorities for 2023",
"truncatedTitle": "4 Tech Planning Priorities for 2023 ",
"content": "<img alt=\"pexels-photo-3183197.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/4-Tech-Planning-Priorities-for-2023/pexels-photo-3183197.jpg.aspx?width=300&height=199\" style=\"width: 300px; height: 199px; float: left;\" title=\"pexels-photo-3183197.jpg\" />Research by the international trade group CompTIA shows that small to medium-size businesses (SMBs) spend more than $600 billion on information technology every year. Moreover, these SMB investments account for 99% of all IT spending.",
"truncatedContent": "Research by the international trade group CompTIA shows that small to medium-size businesses (SMBs) spend more than $600 billion on information technology ...",
"link": "/longmontco612/Resources/4-Tech-Planning-Priorities-for-2023",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/0757cb79-b269-4ced-94ce-5384c6684ed7/attachment.aspx",
"postDate": "11/1/2022 12:50:35 PM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "Compliance",
"link": "?topic=Compliance"
}, {
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/The-Logical-Advantage-November-2022/LogicalAdvantage_Nov2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "96d69527-1e7e-47c5-9c56-6bd184e19996",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Cloud Computing|Outsourcing IT",
"industry": "General-All",
"title": "The Logical Advantage November 2022",
"truncatedTitle": "The Logical Advantage November 2022 ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/The-Logical-Advantage-November-2022",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "11/1/2022 7:39:45 AM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "c6297ad1-9c7a-407e-9cfb-9fe624295043",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cloud Computing|Trends",
"industry": "General-All",
"title": "Cloud Skills Gap Exacerbates Overspending",
"truncatedTitle": "Cloud Skills Gap Exacerbates Overspending ",
"content": "<img alt=\"cloudcomputing-2.jpg\" src=\"/getattachment/19f5d80b-60f7-49cc-a108-26ad8dfd0df9/cloudcomputing-2.jpg.aspx?width=250&height=140\" style=\"width: 250px; height: 140px; float: left;\" title=\"cloudcomputing-2.jpg\" />Nine of 10 IT executives around the globe say they spend too much on cloud services because these resources are underused, overprovisioned or their staff lacks the skills to optimize cloud infrastructure, according to a Forrester study.<br />\r\n ",
"truncatedContent": "Nine of 10 IT executives around the globe say they spend too much on cloud services because these resources are underused, overprovisioned or their staff ...",
"link": "/longmontco612/Resources/Cloud-Skills-Gap-Exacerbates-Overspending",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/271fd32f-1dde-494d-b0ce-121d74dcd128/attachment.aspx",
"postDate": "10/25/2022 8:00:03 AM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "11572a06-49c8-4167-b168-e302eba050b2",
"isGated": false,
"isBlog": false,
"isFeatured": true,
"category": "Videos",
"topic": "Managed Services",
"industry": "General-All",
"title": "TeamLogic IT - The Difference Maker",
"truncatedTitle": "TeamLogic IT - The Difference Maker ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/Managed-Services-with-TeamLogic-IT",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "https://player.vimeo.com/video/757356055",
"image": null,
"postDate": "10/19/2022 8:41:06 AM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "4f586654-59d1-4ed1-9f0c-6fc6833a7137",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Managed Services",
"industry": "General-All",
"title": "Narrow 3 ‘Gaps’ with IT Managed Services",
"truncatedTitle": "Narrow 3 ‘Gaps’ with IT Managed Services ",
"content": "<img alt=\"managed-services-2.jpg\" src=\"/getattachment/a1241230-13c2-4f61-a4ce-302b2180cb83/managed-services-2.jpg.aspx?width=250&height=154\" style=\"width: 250px; height: 154px; float: left;\" title=\"managed-services-2.jpg\" />Gartner research has found that more than half of organizations experience a high degree of regret over big tech purchases tied to cybersecurity, cloud and network infrastructure.<br />\r\n ",
"truncatedContent": "Gartner research has found that more than half of organizations experience a high degree of regret over big tech purchases tied to cybersecurity, cloud ...",
"link": "/longmontco612/Resources/Narrow-3-Gaps-with-IT-Managed-Services",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/1fab950c-13da-4691-ba0c-30c70cdae0a0/attachment.aspx",
"postDate": "10/18/2022 8:08:17 AM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "66736008-a4ff-4b9d-8be1-eae4bc07c6b1",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "4 Tactical Cybersecurity Priorities ",
"truncatedTitle": "4 Tactical Cybersecurity Priorities ",
"content": "In light of the growing threat of damaging cyberthreats, every month is really cybersecurity awareness month. <img alt=\"cybersecurity.jpg\" src=\"/getattachment/d33eb6b2-abb7-4bad-9e80-ad54bf4601f9/cybersecurity.jpg.aspx?width=250&height=140\" style=\"width: 250px; height: 140px; float: left;\" title=\"cybersecurity.jpg\" />",
"truncatedContent": "In light of the growing threat of damaging cyberthreats, every month is really cybersecurity awareness month. ",
"link": "/longmontco612/Resources/4-Tactical-Cybersecurity-Priorities",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/0053f893-846e-457c-9dd6-f2e45f6f2954/attachment.aspx",
"postDate": "10/11/2022 8:00:12 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "77084b83-bde1-4988-a9e6-bb15c0e50b7c",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Business Continuity|Trends",
"industry": "General-All",
"title": "Questions for Business Disruption Prep",
"truncatedTitle": "Questions for Business Disruption Prep ",
"content": "<img alt=\"maturity-1.jpg\" src=\"/getattachment/146385a0-b7b2-4166-8fc4-9e48575c2abc/maturity-1.jpg.aspx?width=250&height=170\" style=\"width: 250px; height: 170px; float: right;\" title=\"maturity-1.jpg\" />After a quiet season, Hurricane Ian roared into Florida, reminding everyone that business disruption can be highly unpredictable—and severe—and technology-dependent organizations (that is, all of us) can never rest when it comes to the need for data backup and disaster recovery planning.<br />\r\n ",
"truncatedContent": "After a quiet season, Hurricane Ian roared into Florida, reminding everyone that business disruption can be highly unpredictable—and severe—and technology-dependent ...",
"link": "/longmontco612/Resources/Questions-for-Business-Disruption-Prep",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/59af37f5-b843-4dd5-a530-ea7f09a77bf8/attachment.aspx",
"postDate": "10/4/2022 7:32:47 AM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/727acfee-846d-43b8-bb1f-1739d21472be/LogicalAdvantage_Oct2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "54ee61d9-ed87-4149-b92c-50e098660248",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Cybersecurity|Outsourcing IT|Trends",
"industry": "General-All",
"title": "The Logical Advantage October 2022",
"truncatedTitle": "The Logical Advantage October 2022 ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/The-Logical-Advantage-October-2022",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "10/1/2022 7:38:23 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "bcedc4c1-6f74-44fc-9b1d-2669e676a3f9",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Cybersecurity Awareness for New Hires",
"truncatedTitle": "Cybersecurity Awareness for New Hires ",
"content": "<img alt=\"pexels-pixabay-60504-1.jpg\" src=\"/getattachment/99a55b55-4bfd-4bd3-9f9c-1a16312d14a1/pexels-pixabay-60504-1.jpg.aspx?width=200&height=133\" style=\"width: 200px; height: 133px; float: right;\" title=\"pexels-pixabay-60504-1.jpg\" />New employees typically come in excited to start a new position and eager to share their professional news with their friends, family and business network. But did you know this also means they’re suddenly attractive targets for spear phishing, smishing, spoofing attacks and other nefarious cyberthreats?<br />\r\n ",
"truncatedContent": "New employees typically come in excited to start a new position and eager to share their professional news with their friends, family and business network. ...",
"link": "/longmontco612/Resources/Cybersecurity-Awareness-for-New-Hires",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/0c3436cf-abba-478d-9e7a-d54e799d3fea/attachment.aspx",
"postDate": "9/27/2022 8:04:44 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "7740e378-6426-4456-8de0-d735ef80aa93",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "3 Guidelines for Cybersecurity Budgeting",
"truncatedTitle": "3 Guidelines for Cybersecurity Budgeting ",
"content": "<img alt=\"cybersecurity-copy-1.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/3-Guidelines-for-Cybersecurity-Budgeting/cybersecurity-copy-1.jpg.aspx?width=200&height=112\" style=\"width: 200px; height: 112px; float: right;\" title=\"cybersecurity-copy-1.jpg\" />Recent research confirms ransomware remains the <a href=\"https://www.teamlogicit.com/Resources/Practice-Zero-Trust-to-Repel-Ransomware\">leading cybersecurity threat</a> across the business spectrum. Here are some sobering statistics:\r\n\r\n<ul>\r\n\t<li>85% of companies experienced a ransomware incident in the last five years</li>\r\n\t<li>60% of organizations have had more than one incursion over the same period</li>\r\n\t<li>The average cost of these attacks exceeds $1 million</li>\r\n</ul>\r\n",
"truncatedContent": "Recent research confirms ransomware remains the leading cybersecurity threat across the business spectrum. Here are some sobering statistics:\r\n\r\n\r\n\t85% ...",
"link": "/longmontco612/Resources/3-Guidelines-for-Cybersecurity-Budgeting",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/a3619bd9-be3f-4f97-aa88-f2c86590bf22/attachment.aspx",
"postDate": "9/20/2022 7:29:06 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "50b342fa-5b4f-4c54-aacb-35352431ebae",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity|Co-managed IT Services",
"industry": "General-All",
"title": "An SMB ‘Blueprint for Ransomware Defense’",
"truncatedTitle": "An SMB ‘Blueprint for Ransomware Defense’ ",
"content": "<img alt=\"December-1-min-1.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/An-SMB-Blueprint-for-Ransomware-Defense/December-1-min-1.jpg.aspx?width=200&height=112\" style=\"width: 200px; height: 112px; float: right;\" title=\"December-1-min-1.jpg\" />According to the U.S. Small Business Administration, there are more than 32 million small- to medium-size businesses (SMBs) across the country, accounting for 99.9% of all business entities. Yet, as many studies show, many of these companies are insufficiently prepared to defend themselves against the rise in today’s most prevalent cybercrimes.",
"truncatedContent": "According to the U.S. Small Business Administration, there are more than 32 million small- to medium-size businesses (SMBs) across the country, accounting ...",
"link": "/longmontco612/Resources/An-SMB-Blueprint-for-Ransomware-Defense",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/8058cdf2-b9d9-4df7-afb6-1ac9bc4552b4/attachment.aspx",
"postDate": "9/13/2022 7:27:50 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Co-managed IT Services",
"link": "?topic=Co-managed IT Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "c856ba37-4fec-4f99-b6d6-111737fec7ee",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "A Primer on ‘Passwordless’ Authentication",
"truncatedTitle": "A Primer on ‘Passwordless’ Authentication ",
"content": "<img alt=\"preventransomeware-1.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/A-Primer-on-Passwordless-Authentication/preventransomeware-1.jpg.aspx?width=200&height=120\" style=\"width: 200px; height: 120px; float: left;\" title=\"preventransomeware-1.jpg\" />Studies show nine of 10 business leaders believe “passwordless” authentication is becoming a foundational element in a culture of “<a href=\"https://www.teamlogicit.com/Resources/3-Pillars-of-Cybersecurity-Resilience-1\">cyber resiliency</a>.” In fact, one recent survey found that 89% of IT security executives at financial services firms feel passwordless methods ensure the highest level of cybersecurity for their companies.",
"truncatedContent": "Studies show nine of 10 business leaders believe “passwordless” authentication is becoming a foundational element in a culture of “cyber resiliency.” ...",
"link": "/longmontco612/Resources/A-Primer-on-Passwordless-Authentication",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/825ea54e-d2fb-4c71-b993-f58ab4ab812d/attachment.aspx",
"postDate": "9/6/2022 7:25:57 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/The-Logical-Advantage-October-2021-Issue-1-1-1-8/LogicalAdvantage_Sep2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "109ac44f-6f65-45e7-a66c-fe4757f78018",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Cybersecurity|Remote workforce",
"industry": "General-All",
"title": "The Logical Advantage September 2022 Issue",
"truncatedTitle": "The Logical Advantage September 2022 Issue ",
"content": "<p><b>Ransomware Continues to Rise</b></p>\r\n\r\n<p>Ransomware remains a top attack vector for cybercriminals with incidents nearly doubling year-over-year according to a recent study.</p>\r\n",
"truncatedContent": "Ransomware Continues to Rise\r\n\r\nRansomware remains a top attack vector for cybercriminals with incidents nearly doubling year-over-year according to ...",
"link": "/longmontco612/Resources/The-Logical-Advantage-October-2021-Issue-1-1-1-8",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/17c11176-33cb-4c24-be1d-4111cf298af7/attachment.aspx",
"postDate": "9/1/2022 7:46:17 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Remote workforce",
"link": "?topic=Remote workforce"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "66a9250d-da6b-4008-a200-49810a6c7e65",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Information Security",
"industry": "General-All",
"title": "Top SMB Defense: Multifactor Authentication",
"truncatedTitle": "Top SMB Defense: Multifactor Authentication ",
"content": "<img alt=\"GettyImages-1368954963-1.jpg\" src=\"/getattachment/c47141b1-1a4b-48b9-9532-14b841eedb3f/GettyImages-1368954963-1.jpg.aspx?width=200&height=133\" style=\"width: 200px; height: 133px; float: left;\" title=\"GettyImages-1368954963-1.jpg\" />Multifactor authentication (MFA)—the security technique that verifies login attempts with an additional layer or validation, such as a code sent by text message—is the simplest, most effective protection against cybercrime for small- to medium-size businesses (SMBs), according to the Cybersecurity and Infrastructure Security Agency (CISA.)<br />\r\n ",
"truncatedContent": "Multifactor authentication (MFA)—the security technique that verifies login attempts with an additional layer or validation, such as a code sent by text ...",
"link": "/longmontco612/Resources/Top-SMB-Defense-Multifactor-Authentication",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/5fc82fcc-9fdb-45ce-aff6-9a921ba3a797/attachment.aspx",
"postDate": "8/30/2022 8:19:23 AM",
"tags": [{
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "56140354-7d95-4d14-a366-ff639be98091",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Compliance|Information Security",
"industry": "General-All",
"title": "Are You Prepared for Business Disruption? Consider these questions to assess readiness",
"truncatedTitle": "Are You Prepared for Business Disruption? ...",
"content": "<img alt=\"GettyImages-1185282377-1.jpg\" src=\"/getattachment/881bbeab-076c-419d-a054-35c05200de05/GettyImages-1185282377-1.jpg.aspx?width=300&height=169\" style=\"width: 300px; height: 169px; float: right;\" title=\"GettyImages-1185282377-1.jpg\" />No one could have predicted the depth and duration of COVID-19’s business impact. But with some hindsight, we can reflect on the experience and maybe even, reluctantly, anticipate the next big disruption.<br />\r\n ",
"truncatedContent": "No one could have predicted the depth and duration of COVID-19’s business impact. But with some hindsight, we can reflect on the experience and maybe ...",
"link": "/longmontco612/Resources/Are-You-Prepared-for-Business-Disruption-Consider",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/ef7fc918-bccd-4dd3-b000-a1b1aad2d620/attachment.aspx",
"postDate": "8/23/2022 8:24:35 AM",
"tags": [{
"name": "Compliance",
"link": "?topic=Compliance"
}, {
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "5af47ec5-b25e-462d-85b7-e143947268bf",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Business Continuity|Cloud Computing",
"industry": "General-All",
"title": "MSPs bridge the gap",
"truncatedTitle": "MSPs bridge the gap ",
"content": "<img alt=\"GettyImages-1368954963.jpg\" src=\"/getattachment/f98f88f3-a4c4-4c1d-8ac2-6af9f8a39742/GettyImages-1323894037.jpg.aspx?lang=en-US&width=300&height=199\" style=\"width: 300px; height: 199px; float: right;\" title=\"GettyImages-1368954963.jpg\" />Gartner predicts firms of all sizes will increasingly turn to managed IT services as an alternative to hiring in-house cloud specialists. The complexity involved in transitioning existing infrastructure and data to the cloud requires a particular set of skills, and with the soaring salaries of professionals with those capabilities, hiring is not a cost-effective option for many companies.<br />\r\n ",
"truncatedContent": "Gartner predicts firms of all sizes will increasingly turn to managed IT services as an alternative to hiring in-house cloud specialists. The complexity ...",
"link": "/longmontco612/Resources/MSPs-bridge-the-gap",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/8fc1a56d-047c-473c-b092-ef0e3c58db6d/attachment.aspx",
"postDate": "8/16/2022 8:22:31 AM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "730d5430-69e8-4453-93eb-1b20502a177f",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cloud Computing",
"industry": "General-All",
"title": "Cloud Skills Gap Can Hinder Effective Usage",
"truncatedTitle": "Cloud Skills Gap Can Hinder Effective Usage ",
"content": "<img alt=\"GettyImages-1165048144-1.jpg\" src=\"/getattachment/ca11cde1-780d-4aca-9e72-15a91f3871e3/GettyImages-1165048144-1.jpg.aspx?width=300&height=168\" style=\"width: 300px; height: 168px; float: right;\" title=\"GettyImages-1165048144-1.jpg\" />Cloud services are fast becoming a preferred technology tool for business enablement. Nearly two-thirds (60%) of respondents to a recent Forrester survey told researchers they already use some level of cloud services. Another 21% reported plans to move to a cloud architecture within 12 months.<br />\r\n ",
"truncatedContent": "Cloud services are fast becoming a preferred technology tool for business enablement. Nearly two-thirds (60%) of respondents to a recent Forrester survey ...",
"link": "/longmontco612/Resources/Cloud-Skills-Gap-Can-Hinder-Effective-Usage",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/ee797620-14fd-4397-bc94-47025fbe584b/attachment.aspx",
"postDate": "8/9/2022 4:20:53 PM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/The-Logical-Advantage-October-2021-Issue-1-1-1-7/LogicalAdvantage_Aug2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "d5d917c9-d015-422a-a8c0-f20ae2f34894",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Information Security|Outsourcing IT|Remote workforce",
"industry": "General-All",
"title": "The Logical Advantage August 2022 Issue",
"truncatedTitle": "The Logical Advantage August 2022 Issue ",
"content": "<p><b>Embracing Hybrid Work as the ‘Future of Work’ </b></p>\r\n\r\n<p>Microsoft’s 2022 Work Trend Index confirms the ranks of hybrid employees–workers who split time between the office and remote locations—will continue climbing even as pandemic conditions decline.</p>\r\n",
"truncatedContent": "Embracing Hybrid Work as the ‘Future of Work’ \r\n\r\nMicrosoft’s 2022 Work Trend Index confirms the ranks of hybrid employees–workers who split time between ...",
"link": "/longmontco612/Resources/The-Logical-Advantage-October-2021-Issue-1-1-1-7",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/1bb2375d-bcf9-49c8-81b2-a426b71c402a/attachment.aspx",
"postDate": "8/1/2022 7:46:17 AM",
"tags": [{
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "Remote workforce",
"link": "?topic=Remote workforce"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "6265d05e-4868-4b1e-b5be-2660af0e9e03",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": " Incident Response for ‘Cyber Resiliency’",
"truncatedTitle": " Incident Response for ‘Cyber Resiliency’ ",
"content": "“Cyber resiliency” is the ultimate goal for building your ability to respond to cyberattacks. <a name=\"_Hlk79170134\">The National Institute for Standards and Technology (NIST) defines cyber resiliency as: </a>“The ability to anticipate, withstand, recover from and adapt to adverse conditions, stresses, attacks or compromises on systems that use or are enabled by cyber resources.”<img alt=\"digitaltrans-4.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Incident-Response-for-Cyber-Resiliency-1/digitaltrans-4.jpg.aspx?width=150&height=84\" style=\"width: 150px; height: 84px; float: right;\" title=\"digitaltrans-4.jpg\" /><br />\r\n ",
"truncatedContent": "“Cyber resiliency” is the ultimate goal for building your ability to respond to cyberattacks. The National Institute for Standards and Technology (NIST) ...",
"link": "/longmontco612/Resources/Incident-Response-for-Cyber-Resiliency-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/66b19612-7180-4a87-920c-76832617d3b3/attachment.aspx",
"postDate": "7/26/2022 8:00:00 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "85c6f059-814a-4f7d-ad30-f98e9c28a45e",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Ransomware Remains Rampant",
"truncatedTitle": "Ransomware Remains Rampant ",
"content": "<p>No matter what the size of your organization, cybersecurity is a clear and present danger. And the threats have ratcheted up this year in tandem with the Russian invasion of Ukraine.<img alt=\"GettyImages-1367732436-2.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Ransomware-Remains-Rampant-1/GettyImages-1367732436-2.jpg.aspx?width=200&height=112\" style=\"width: 200px; height: 112px; float: right;\" title=\"GettyImages-1367732436-2.jpg\" /></p>\r\n",
"truncatedContent": "No matter what the size of your organization, cybersecurity is a clear and present danger. And the threats have ratcheted up this year in tandem with ...",
"link": "/longmontco612/Resources/Ransomware-Remains-Rampant-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/da3c02a1-5cd8-4895-bcb9-10901235b9f8/attachment.aspx",
"postDate": "7/19/2022 8:47:40 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "41c3bca2-b4f7-4e7b-abfb-d8ddb3101845",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "3 Pillars of Cybersecurity Resilience",
"truncatedTitle": "3 Pillars of Cybersecurity Resilience ",
"content": "<p>A survey reported on by <i>ITProPortal </i>found that more than half (51%) of tech leaders polled lack confidence in their organization’s ability to defend itself against cyberattacks.<img alt=\"pexels-tima-miroshnichenko-5380651-2.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/3-Pillars-of-Cybersecurity-Resilience-1/pexels-tima-miroshnichenko-5380651-2.jpg.aspx?width=200&height=133\" style=\"width: 200px; height: 133px; float: right;\" title=\"pexels-tima-miroshnichenko-5380651-2.jpg\" /></p>\r\n",
"truncatedContent": "A survey reported on by ITProPortal found that more than half (51%) of tech leaders polled lack confidence in their organization’s ability to defend ...",
"link": "/longmontco612/Resources/3-Pillars-of-Cybersecurity-Resilience-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/211c545d-5418-4a5a-afa5-fa8d3c87a109/attachment.aspx",
"postDate": "7/12/2022 8:45:23 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "123d3145-5a6a-45eb-85f2-bc08c65bd615",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Taking ‘Zero Trust’ to the Next Level",
"truncatedTitle": "Taking ‘Zero Trust’ to the Next Level ",
"content": "The “Zero Trust” cybersecurity concept has been gathering speed for nearly a decade, but core elements of the framework are not always clear to business leaders. That’s why the National Institute for Standards and Technology (NIST) published new guidance last year on Zero Trust architecture.<img alt=\"cyberdefense-2.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Taking-Zero-Trust-to-the-Next-Level-1/cyberdefense-2.jpg.aspx?width=150&height=84\" style=\"width: 150px; height: 84px; float: right;\" title=\"cyberdefense-2.jpg\" /><br />\r\n ",
"truncatedContent": "The “Zero Trust” cybersecurity concept has been gathering speed for nearly a decade, but core elements of the framework are not always clear to business ...",
"link": "/longmontco612/Resources/Taking-Zero-Trust-to-the-Next-Level-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/9ff5ee10-ce3c-4f54-af20-a85ad3517579/attachment.aspx",
"postDate": "7/5/2022 8:43:57 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/The-Logical-Advantage-October-2021-Issue-1-1-1-6/LogicalAdvantage_Jul2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "fd1c9d71-af76-4b44-911a-b4a73a2fd444",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Cybersecurity|Information Security",
"industry": "General-All",
"title": "The Logical Advantage July 2022 Issue",
"truncatedTitle": "The Logical Advantage July 2022 Issue ",
"content": "<p><b>‘Shields Up’ Against Escalating Cyber Threats</b></p>\r\n\r\n<p>When Russia invaded Ukraine earlier this year, officials at the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and other organizations that monitor malicious cyber activity detected a spike of more than 800% in 48 hours.</p>\r\n\r\n<p>TeamLogicIT.com</p>\r\n",
"truncatedContent": "‘Shields Up’ Against Escalating Cyber Threats\r\n\r\nWhen Russia invaded Ukraine earlier this year, officials at the U.S. Cybersecurity and Infrastructure ...",
"link": "/longmontco612/Resources/The-Logical-Advantage-October-2021-Issue-1-1-1-6",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/d927ee93-e750-44c0-bf7f-895f0c844f22/attachment.aspx",
"postDate": "7/1/2022 7:46:17 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "602411ab-e07f-4caf-a82e-c70df9fd6431",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Ask These Cybersecurity Questions Often",
"truncatedTitle": "Ask These Cybersecurity Questions Often ",
"content": "<img alt=\"pexels-pixabay-60504-2.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Ask-These-Cybersecurity-Questions-Often/pexels-pixabay-60504-2.jpg.aspx?width=150&height=100\" style=\"width: 150px; height: 100px; float: right;\" title=\"pexels-pixabay-60504-2.jpg\" />CompTIA’s Cybersecurity Advisory Council publishes “Are We Safe?” a guide to assessing cybersecurity risks, policies and practices for leaders at organizations large and small.<br />\r\n ",
"truncatedContent": "CompTIA’s Cybersecurity Advisory Council publishes “Are We Safe?” a guide to assessing cybersecurity risks, policies and practices for leaders at organizations ...",
"link": "/longmontco612/Resources/Ask-These-Cybersecurity-Questions-Often",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/3dcf9a5a-4238-4b93-a420-260c53616690/attachment.aspx",
"postDate": "6/28/2022 8:00:56 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "ae38ad1f-7f20-4d73-bc2d-8c82954f5641",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity|Information Security",
"industry": "General-All",
"title": "Practice Zero Trust to Repel Ransomware",
"truncatedTitle": "Practice Zero Trust to Repel Ransomware ",
"content": "That’s one reason CISA advocates that “every organization—large and small—must be prepared to respond to disruptive cyberincidents.”",
"truncatedContent": "That’s one reason CISA advocates that “every organization—large and small—must be prepared to respond to disruptive cyberincidents.” ",
"link": "/longmontco612/Resources/Practice-Zero-Trust-to-Repel-Ransomware",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/8f546868-955f-4c3a-901c-2ec0303cfd2f/attachment.aspx",
"postDate": "6/21/2022 8:00:45 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/IT-Relocation-Services/RelocationServicesInfoSheet_2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "43134d8d-912d-468c-8283-a051e99737b4",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Managed Services",
"industry": "Financial & Insurance",
"title": "IT Relocation Services",
"truncatedTitle": "IT Relocation Services ",
"content": "<p>Businesses inevitably evolve resulting in change. Whether you’re upsizing or downsizing, office moves are never easy. Organizations faced with this challenge understand the significance of entrusting their office and data center relocation to an experienced resource like TeamLogic IT.</p>\r\n",
"truncatedContent": "Businesses inevitably evolve resulting in change. Whether you’re upsizing or downsizing, office moves are never easy. Organizations faced with this challenge ...",
"link": "/longmontco612/Resources/IT-Relocation-Services",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/16/2022 1:33:43 PM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/Networking-Design-Configuration/NetworkConfigurationInfoSheet_2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "068fcf9c-149b-42c8-bad9-2431fead06c7",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Managed Services",
"industry": "Manufacturing & Distribution",
"title": "Networking Design & Configuration Service",
"truncatedTitle": "Networking Design & Configuration Service ",
"content": "<p>Networking design and configuration services from TeamLogic IT can help you upgrade an existing network or design and install a new one.</p>\r\n",
"truncatedContent": "Networking design and configuration services from TeamLogic IT can help you upgrade an existing network or design and install a new one.\r\n ",
"link": "/longmontco612/Resources/Networking-Design-Configuration",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/16/2022 1:32:36 PM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Manufacturing & Distribution",
"link": "?industries=Manufacturing & Distribution"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/Technology-Procurement/TechProcurementInfoSheet_2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "eb5475ad-6c52-4752-a6d9-8375b61381d7",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Information Security",
"industry": "Financial & Insurance",
"title": "Technology Procurement",
"truncatedTitle": "Technology Procurement ",
"content": "<p>Whether you’re establishing a new office, expanding your present one or upgrading your IT systems, we offer full service consultative sales and support.</p>\r\n",
"truncatedContent": "Whether you’re establishing a new office, expanding your present one or upgrading your IT systems, we offer full service consultative sales and support.\r\n ",
"link": "/longmontco612/Resources/Technology-Procurement",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/16/2022 1:30:41 PM",
"tags": [{
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/Mobility-Services/MobilityServicesInfoSheet_2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "456d28f7-0b30-4181-98d3-e5370b5496bf",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Mobility",
"industry": "Education",
"title": "Mobility Services",
"truncatedTitle": "Mobility Services ",
"content": "<p>From field representatives and business travelers to multiple office locations, the information you need can be accessed anytime, anywhere.</p>\r\n",
"truncatedContent": "From field representatives and business travelers to multiple office locations, the information you need can be accessed anytime, anywhere.\r\n ",
"link": "/longmontco612/Resources/Mobility-Services",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/16/2022 1:28:54 PM",
"tags": [{
"name": "Mobility",
"link": "?topic=Mobility"
}, {
"name": "Education",
"link": "?industries=Education"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/Malware-Protection-Services/MalwareProtectionInfoSheet_2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "e0e3c367-f288-47b6-a67e-dc074b1c2fee",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Cybersecurity",
"industry": "Financial & Insurance",
"title": "Malware Protection Services",
"truncatedTitle": "Malware Protection Services ",
"content": "<p>Malware is the umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. </p>\r\n",
"truncatedContent": "Malware is the umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ...",
"link": "/longmontco612/Resources/Malware-Protection-Services",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/16/2022 1:27:24 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/Help-Desk-Services/HelpDeskInfoSheet_2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "1e1ee55b-eda4-4bee-9b97-b6930ca86b78",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Managed Services",
"industry": "Financial & Insurance",
"title": "Help Desk Services",
"truncatedTitle": "Help Desk Services ",
"content": "<p>Some of our business customers may require access to technical support 24 hours a day, 7 days a week, 365 days a year. The nature of your business demands it and we’re ready to assist with our 24/7 help desk services. </p>\r\n",
"truncatedContent": "Some of our business customers may require access to technical support 24 hours a day, 7 days a week, 365 days a year. The nature of your business demands ...",
"link": "/longmontco612/Resources/Help-Desk-Services",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/16/2022 1:22:36 PM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/Data-Voice-Connectivity-1/DataVoiceConnectivity_2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "169b31cf-080c-4bfb-b900-8c3ec5fd70d2",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Data/Voice/Connectivity",
"industry": "Manufacturing & Distribution",
"title": "Data/Voice/Connectivity",
"truncatedTitle": "Data/Voice/Connectivity ",
"content": "<p>Connectivity is all-important to your company at every level—from “always on” efficiency to scalability and cost management. It’s worth taking a moment to re-assess whether or not your current communication system is up to the challenge of your workplace environment. </p>\r\n",
"truncatedContent": "Connectivity is all-important to your company at every level—from “always on” efficiency to scalability and cost management. It’s worth taking a moment ...",
"link": "/longmontco612/Resources/Data-Voice-Connectivity-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/16/2022 1:17:10 PM",
"tags": [{
"name": "Data/Voice/Connectivity",
"link": "?topic=Data/Voice/Connectivity"
}, {
"name": "Manufacturing & Distribution",
"link": "?industries=Manufacturing & Distribution"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/Mac-Support-Services/MacSupportInfoSheet_2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "2ec19138-a1f8-4cc2-a21b-dfdca4c1f227",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Managed Services",
"industry": "Non-Profit",
"title": "Mac Support Services",
"truncatedTitle": "Mac Support Services ",
"content": "<p>With more and more companies welcoming Macintosh computers into the workplace, our computer services and network solutions now include Mac support services for all Apple office products. </p>\r\n",
"truncatedContent": "With more and more companies welcoming Macintosh computers into the workplace, our computer services and network solutions now include Mac support services ...",
"link": "/longmontco612/Resources/Mac-Support-Services",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/16/2022 1:14:15 PM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Non-Profit",
"link": "?industries=Non-Profit"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/Server-Installation-Support/ServerInstallationAndSupportInfoSheet_2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "0835196d-f6df-46a7-984b-0f26476e82e1",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Managed Services",
"industry": "Financial & Insurance",
"title": "Server Installation & Support",
"truncatedTitle": "Server Installation & Support ",
"content": "<p>Our server installation and support services are focused on keeping your business humming—meeting the network demands of today while planning for tomorrow. Whether building a new office computer system from the ground up or reconfiguring an existing one to accommodate growth and offsite locations, we have access to the latest technologies to connect you with the right network solution.</p>\r\n",
"truncatedContent": "Our server installation and support services are focused on keeping your business humming—meeting the network demands of today while planning for tomorrow. ...",
"link": "/longmontco612/Resources/Server-Installation-Support",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/16/2022 1:12:21 PM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "79268137-b9ac-4473-94af-aa0324a41b93",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "5 Cybersecurity Training Tips for Top Performance",
"truncatedTitle": "5 Cybersecurity Training Tips for Top Performance ",
"content": "Nearly half of SMBs surveyed consider training team members to detect and deflect cyberthreats to be on par with other essential measures such as implementing the newest technology tools and executing incident response procedures.",
"truncatedContent": "Nearly half of SMBs surveyed consider training team members to detect and deflect cyberthreats to be on par with other essential measures such as implementing ...",
"link": "/longmontco612/Resources/5-Cybersecurity-Training-Tips-for-Top-Performance",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/38f0cf02-be00-4093-9270-3bcdeac023f1/attachment.aspx",
"postDate": "6/14/2022 8:00:47 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "531487bb-d095-4955-974f-4f0c81422abb",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Vishing Cyberattacks Hit an All-Time High",
"truncatedTitle": "Vishing Cyberattacks Hit an All-Time High ",
"content": "Vishing is a form of social engineering, a class of fraud that tricks people into sharing sensitive information. In a typical attack, cybercrooks posing as legitimate businesses send emails about serious issues, provide a contact number and request an immediate callback to resolve the matter.",
"truncatedContent": "Vishing is a form of social engineering, a class of fraud that tricks people into sharing sensitive information. In a typical attack, cybercrooks posing ...",
"link": "/longmontco612/Resources/Vishing-Cyberattacks-Hit-an-All-Time-High",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/5fcaa3b7-4b41-47b4-84dd-0469b9131f14/attachment.aspx",
"postDate": "6/7/2022 8:22:18 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/The-Logical-Advantage-October-2021-Issue-1-1-1-5/TeamLogic-IT-LogicalAdvantage_Jun2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "9bf74d96-f92a-4e3a-a63d-56b07f4f888e",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Business Continuity|Information Security",
"industry": "General-All",
"title": "The Logical Advantage June 2022 Issue",
"truncatedTitle": "The Logical Advantage June 2022 Issue ",
"content": "<p><b>Meeting Demand for Security Services, Business Continuity and Disaster Recovery: From Recoverability to Resiliency, Put Technologists on Your IT Team</b></p>\r\n",
"truncatedContent": "Meeting Demand for Security Services, Business Continuity and Disaster Recovery: From Recoverability to Resiliency, Put Technologists on Your IT Team\r\n ",
"link": "/longmontco612/Resources/The-Logical-Advantage-October-2021-Issue-1-1-1-5",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/1/2022 7:46:17 AM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "ec6fdf98-3e2c-4f3f-8b45-b405a48d84d8",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cloud Computing|Co-managed IT Services",
"industry": "General-All",
"title": "Sharpen Your IT Infrastructure ‘Edge’",
"truncatedTitle": "Sharpen Your IT Infrastructure ‘Edge’ ",
"content": "In simple terms, edge computing involves building and sustaining an IT infrastructure that delivers digital resources suc<img alt=\"cloud-min-small.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Sharpen-Your-IT-Infrastructure-Edge/cloud-min-small.jpg.aspx\" style=\"float: right;\" title=\"cloud-min-small.jpg\" />h as data, applications and processing power closer to where work is being done. For a manufacturing operation, this could be the factory floor. For a retail enterprise, it could be a chain of stores. And for the expanding hybrid workforce spanning the spectrum of businesses, that means an array of edge locations such as home offices.",
"truncatedContent": "In simple terms, edge computing involves building and sustaining an IT infrastructure that delivers digital resources such as data, applications and ...",
"link": "/longmontco612/Resources/Sharpen-Your-IT-Infrastructure-Edge",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/81965267-012c-45ee-995d-c041050bd841/attachment.aspx",
"postDate": "5/17/2022 8:00:18 AM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "Co-managed IT Services",
"link": "?topic=Co-managed IT Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "d060b919-e836-4129-b733-1e31c6280c78",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Managed Services",
"industry": "General-All",
"title": "4 Signs You Need a New IT Managed Services Provider",
"truncatedTitle": "4 Signs You Need a New IT Managed Services ...",
"content": "<img alt=\"humanize-small.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/4-Signs-You-Need-a-New-IT-Managed-Services-Provide/humanize-small.jpg.aspx?width=128&height=85\" style=\"width: 128px; height: 85px; float: right;\" title=\"humanize-small.jpg\" />If you’re among the millions of small businesses that use a managed IT services provider (MSP), congratulations. You have more wisdom, vision and foresight than many of your competitors. It’s also likely that you’re reaping the myriad rewards of this trusted contracting arrangement, including lower costs, less downtime and greater network security.",
"truncatedContent": "If you’re among the millions of small businesses that use a managed IT services provider (MSP), congratulations. You have more wisdom, vision and foresight ...",
"link": "/longmontco612/Resources/4-Signs-You-Need-a-New-IT-Managed-Services-Provide",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/af1eae56-1867-4663-a17a-4434643593e9/attachment.aspx",
"postDate": "5/10/2022 8:00:32 AM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "30a2f116-a0bf-4324-987c-c43f0a758cac",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Information Security",
"industry": "General-All",
"title": "Getting the DR Plan Right: Tips & Traps",
"truncatedTitle": "Getting the DR Plan Right: Tips & Traps ",
"content": "<img alt=\"recov-small.jpeg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Getting-the-DR-Plan-Right-Tips-Traps/recov-small.jpeg.aspx\" style=\"float: right;\" title=\"recov-small.jpeg\" />First, some good news: a significant majority (95%) of 762 IT pros surveyed by Spiceworks report having a disaster recovery (DR) plan in place—90% of which cover data integrity and backups. The goal of planning, of course, is to help organizations bounce back from hardware failure, power outages, natural disasters and other disruptive events.",
"truncatedContent": "First, some good news: a significant majority (95%) of 762 IT pros surveyed by Spiceworks report having a disaster recovery (DR) plan in place—90% of ...",
"link": "/longmontco612/Resources/Getting-the-DR-Plan-Right-Tips-Traps",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/69612e4b-aab1-44ce-8f72-f527d59dbd0a/attachment.aspx",
"postDate": "5/3/2022 3:51:56 PM",
"tags": [{
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/The-Logical-Advantage-October-2021-Issue-1-1-1-4/TeamLogic-IT-LogicalAdvantage_May2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "20127251-05d2-440e-ab12-9141ec2a2e37",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Cloud Computing|Information Security|Remote workforce",
"industry": "General-All",
"title": "The Logical Advantage May 2022 Issue",
"truncatedTitle": "The Logical Advantage May 2022 Issue ",
"content": "<p><b>Hybrid Work Options Foster Business Growth, Support Hybrid Workers with Hybrid Cloud, Security Training for Hybrid Workers</b></p>\r\n",
"truncatedContent": "Hybrid Work Options Foster Business Growth, Support Hybrid Workers with Hybrid Cloud, Security Training for Hybrid Workers\r\n ",
"link": "/longmontco612/Resources/The-Logical-Advantage-October-2021-Issue-1-1-1-4",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "5/1/2022 7:46:17 AM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "Remote workforce",
"link": "?topic=Remote workforce"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "788b4f7d-f79c-45c9-a11f-971e0cf17f3c",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Hackers Thank You for These 3 Slip-Ups",
"truncatedTitle": "Hackers Thank You for These 3 Slip-Ups ",
"content": "<em><img alt=\"hackers.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Hackers-Thank-You-for-These-3-Slip-Ups/hackers.jpg.aspx?width=128&height=67\" style=\"width: 128px; height: 67px; float: left;\" title=\"hackers.jpg\" />Leave it to the Dark Reading website to bring hidden vulnerabilities into the light. In an eye-opening exposé, white-hat hackers and social engineers reveal several forehead-slapping ways your employees (including HR staff) can unwittingly help cyberthieves loot your company and pillage its data.</em>",
"truncatedContent": "Leave it to the Dark Reading website to bring hidden vulnerabilities into the light. In an eye-opening exposé, white-hat hackers and social engineers ...",
"link": "/longmontco612/Resources/Hackers-Thank-You-for-These-3-Slip-Ups",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/086f614f-b99b-4ece-b9af-702babfabf48/attachment.aspx",
"postDate": "4/26/2022 8:00:05 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "5a5ccdb1-b81d-4d3f-86be-140a1d314e13",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Managed Services",
"industry": "General-All",
"title": "Get Some Traction for your Digital Transformation",
"truncatedTitle": "Get Some Traction for your Digital Transformation ",
"content": "<em><img alt=\"digitaltrans.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Give-Your-Digital-Transformation-Some-Traction/digitaltrans.jpg.aspx?width=128&height=71\" style=\"width: 128px; height: 71px; float: left;\" title=\"digitaltrans.jpg\" /><br />\r\nDigital transformation has business leaders’ attention because of its potential benefits.</em>",
"truncatedContent": "\r\nDigital transformation has business leaders’ attention because of its potential benefits. ",
"link": "/longmontco612/Resources/Give-Your-Digital-Transformation-Some-Traction",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/978d4582-ebbc-4dc5-8faa-7cefe62f081a/attachment.aspx",
"postDate": "4/19/2022 8:05:39 AM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "69dd5a87-5cc7-4bb5-8e17-5be626c08d42",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity|Information Security",
"industry": "General-All",
"title": "Vishing & Smishing: Old Ploy, New Tricks",
"truncatedTitle": "Vishing & Smishing: Old Ploy, New Tricks ",
"content": "<em><img alt=\"vishing.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Vishing-Smishing-Old-Ploy-New-Tricks-1/vishing.jpg.aspx?width=128&height=85\" style=\"width: 128px; height: 85px; float: right;\" title=\"vishing.jpg\" />Human beings have long been the weakest link in your cybersecurity chain. So it may not surprise you when experts say that up to 98% of all cyberattacks rely on social engineering—the dark art of inducing (then leveraging) predictable human responses to trick people into handing over sensitive information.</em>",
"truncatedContent": "Human beings have long been the weakest link in your cybersecurity chain. So it may not surprise you when experts say that up to 98% of all cyberattacks ...",
"link": "/longmontco612/Resources/Vishing-Smishing-Old-Ploy-New-Tricks-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/fa378ec3-cbd4-435e-b5a1-4cce6a049da5/attachment.aspx",
"postDate": "4/12/2022 8:02:13 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "a48838b0-39f7-4c37-9d51-e0f801c2ecc2",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Cybersecurity",
"industry": "Healthcare|Legal Services|Financial & Insurance",
"title": "When Viruses Attack So Does TeamLogic IT",
"truncatedTitle": "When Viruses Attack So Does TeamLogic IT ",
"content": "When Viruses Attack, So Does TeamLogic IT",
"truncatedContent": "When Viruses Attack, So Does TeamLogic IT ",
"link": "/longmontco612/Resources/When-Viruses-Attack-So-Does-TeamLogic-IT",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/2c0c6590-51a4-4cf4-9723-9874eda4263f/attachment.aspx",
"postDate": "4/11/2022 10:45:57 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}, {
"name": "Legal Services",
"link": "?industries=Legal Services"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "359f3803-e442-4639-ac70-f3c46737f8f5",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cloud Computing",
"industry": "General-All",
"title": "Considering Cloud? Plan to Avoid Migration Missteps ",
"truncatedTitle": "Considering Cloud? Plan to Avoid Migration ...",
"content": "<em><img alt=\"cloud-min.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Considering-Cloud-Plan-to-Avoid-Migration-Missteps/cloud-min.jpg.aspx?width=128&height=72\" style=\"width: 128px; height: 72px; float: left;\" title=\"cloud-min.jpg\" />Thinking about migrating some (or more) of your business to the cloud? You’re not alone. By some estimates, as many as 80% of companies today rely on cloud services for vital functions such as data backup, remote offices, media storage and more.</em>",
"truncatedContent": "Thinking about migrating some (or more) of your business to the cloud? You’re not alone. By some estimates, as many as 80% of companies today rely on ...",
"link": "/longmontco612/Resources/Considering-Cloud-Plan-to-Avoid-Migration-Missteps",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/26ce7fbf-4fdd-4358-906f-80410b004ca0/attachment.aspx",
"postDate": "4/5/2022 8:00:19 AM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/The-Logical-Advantage-October-2021-Issue-1-1-1-3/TeamLogic-IT-LogicalAdvantage_Apr2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "b89ed291-9bd5-4473-a79c-638db52b8eed",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Cybersecurity|Trends|Co-managed IT Services",
"industry": "General-All",
"title": "The Logical Advantage April 2022 Issue",
"truncatedTitle": "The Logical Advantage April 2022 Issue ",
"content": "<p><b>Tech Talent Drives Digital Transformation, Nurturing Relationships with Tech Talent, Incident Response for ‘Cyber Resiliency’</b></p>\r\n",
"truncatedContent": "Tech Talent Drives Digital Transformation, Nurturing Relationships with Tech Talent, Incident Response for ‘Cyber Resiliency’\r\n ",
"link": "/longmontco612/Resources/The-Logical-Advantage-October-2021-Issue-1-1-1-3",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "4/1/2022 7:46:17 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "Co-managed IT Services",
"link": "?topic=Co-managed IT Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "49b3ebc8-7412-4609-a5e1-578fded491f5",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Security Training for Hybrid Workers",
"truncatedTitle": "Security Training for Hybrid Workers ",
"content": "<em><img alt=\"hybrid.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Security-Training-for-Hybrid-Workers/hybrid.jpg.aspx?width=128&height=73\" style=\"width: 128px; height: 73px; float: left;\" title=\"hybrid.jpg\" />Many companies see education as the prime strategy for bolstering their organization’s cybersecurity posture in today’s post-pandemic era of the hybrid workforce. Today’s technology processes require “security-first thinking in the overall workforce,” the CompTIA report noted. “Unless there is buy-in throughout the organization, the process of security will break down, leaving the business exposed.”</em><br />\r\n ",
"truncatedContent": "Many companies see education as the prime strategy for bolstering their organization’s cybersecurity posture in today’s post-pandemic era of the hybrid ...",
"link": "/longmontco612/Resources/Security-Training-for-Hybrid-Workers",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/42e50f1f-f7f1-469f-af23-1a4029487d4e/attachment.aspx",
"postDate": "3/29/2022 8:00:00 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "1ba06387-5d1c-429f-94a2-fbce5c4ab68d",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity|Information Security",
"industry": "General-All",
"title": "Incident Response for “Cyber Resiliency”",
"truncatedTitle": "Incident Response for “Cyber Resiliency” ",
"content": "<em><img alt=\"cyberresilence.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Incident-Response-for-Cyber-Resiliency/cyberresilence.jpg.aspx?width=128&height=71\" style=\"width: 128px; height: 71px; float: right;\" title=\"cyberresilence.jpg\" />“Cyber resiliency” is the ultimate goal for building your ability to respond to cyberattacks. <a name=\"_Hlk79170134\">The National Institute for Standards and Technology (NIST) defines cyber resiliency as: </a>“The ability to anticipate, withstand, recover from and adapt to adverse conditions, stresses, attacks or compromises on systems that use or are enabled by cyber resources.”</em>",
"truncatedContent": "“Cyber resiliency” is the ultimate goal for building your ability to respond to cyberattacks. The National Institute for Standards and Technology (NIST) ...",
"link": "/longmontco612/Resources/Incident-Response-for-Cyber-Resiliency",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/76f505e0-f4d0-4d44-b1b8-2bc4d81bbdeb/attachment.aspx",
"postDate": "3/22/2022 8:00:00 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "4df07791-035c-4039-8c76-96dba10129ca",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "3 Traits of Cybersecurity Champions",
"truncatedTitle": "3 Traits of Cybersecurity Champions ",
"content": "<em><img alt=\"cybersecurity.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/3-Traits-of-Cybersecurity-Champions/cybersecurity.jpg.aspx?width=128&height=71\" style=\"width: 128px; height: 71px; float: right;\" title=\"cybersecurity.jpg\" />Today’s business environment requires “security-first thinking in the overall workforce,” CompTIA analysts wrote in their report. That’s why some organizations are developing “cybersecurity champion” programs, according to CSO magazine. These programs combine “education with peer-to-peer collaboration to embed a culture of security understanding, support, and positive behavior among a workforce.”</em>",
"truncatedContent": "Today’s business environment requires “security-first thinking in the overall workforce,” CompTIA analysts wrote in their report. That’s why some organizations ...",
"link": "/longmontco612/Resources/3-Traits-of-Cybersecurity-Champions",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/f013279f-156f-44c6-90fe-7ce8c6347898/attachment.aspx",
"postDate": "3/15/2022 8:00:00 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "2d1ef63b-19b9-4fc3-9ab9-8d6ae67ab184",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "3 Special Cybersecurity Support Services",
"truncatedTitle": "3 Special Cybersecurity Support Services ",
"content": "<em><img alt=\"cybersecurity2.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/3-Special-Cybersecurity-Support-Services/cybersecurity2.jpg.aspx?width=128&height=85\" style=\"width: 128px; height: 85px; float: left;\" title=\"cybersecurity2.jpg\" />This skills gap can be especially challenging for a small to mid-size businesses (SMBs). Analysts say SMBs as a group suffer nearly half of all cyberattacks but typically lack equivalent internal resources to protect themselves. This situation can make engaging cybersecurity expertise an existential issue for an SMB, as IBM’s latest research estimates a single data breach can cost a small company between $2 million to $3 million.</em>",
"truncatedContent": "This skills gap can be especially challenging for a small to mid-size businesses (SMBs). Analysts say SMBs as a group suffer nearly half of all cyberattacks ...",
"link": "/longmontco612/Resources/3-Special-Cybersecurity-Support-Services",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/d4e888dc-598c-408a-a76a-a830655678ae/attachment.aspx",
"postDate": "3/8/2022 8:00:00 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/TeamlogicIT/media/TLIT-Images/Resources/Case%20Studies/TruckPermitting_CaseStudy_2022.pdf?ext=.pdf",
"id": "6d36673b-da9e-4475-a8bf-54453216009c",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Trends|Co-managed IT Services",
"industry": "General-All",
"title": "TeamLogic IT Unravels a Permitting Company’s IT Nightmare",
"truncatedTitle": "TeamLogic IT Unravels a Permitting Company’s ...",
"content": "<p><b><i>The owners of a permitting company count their many blessings as they recall how their business persevered through a tortuous year of IT disasters. </i></b></p>\r\n",
"truncatedContent": "The owners of a permitting company count their many blessings as they recall how their business persevered through a tortuous year of IT disasters. \r\n ",
"link": "/longmontco612/Resources/TeamLogic-IT-Unravels-a-Permitting-Company-s-IT-Ni",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "3/7/2022 2:50:41 PM",
"tags": [{
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "Co-managed IT Services",
"link": "?topic=Co-managed IT Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/TeamlogicIT/media/TLIT-Images/Resources/Case%20Studies/PatientRecords_CaseStudy_2022.pdf?ext=.pdf",
"id": "b83e4fe0-8df5-4546-bc76-f79073d7ee8d",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Compliance|Cybersecurity",
"industry": "Healthcare",
"title": "TeamLogic IT Heals Patient Records Workflow",
"truncatedTitle": "TeamLogic IT Heals Patient Records Workflow ",
"content": "<p><br />\r\n<b><i>A home health hospice company that services patients through eight locations had purchased a document management software system that was a huge investment for them</i></b></p>\r\n",
"truncatedContent": "\r\nA home health hospice company that services patients through eight locations had purchased a document management software system that was a huge investment ...",
"link": "/longmontco612/Resources/TeamLogic-IT-Heals-Patient-Records-Management-Work",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "3/7/2022 2:43:35 PM",
"tags": [{
"name": "Compliance",
"link": "?topic=Compliance"
}, {
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "/TeamlogicIT/media/TLIT-Images/Resources/Case%20Studies/Egnyte_CaseStudy_2022.pdf?ext=.pdf",
"id": "655f37bd-bebf-4769-b0b7-58542084c933",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Information Security|Managed Services",
"industry": "Healthcare",
"title": "How IT Transformation Helps Parkinson’s Institute Provide World-Class Patient Care",
"truncatedTitle": "How IT Transformation Helps Parkinson’s ...",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/How-IT-Transformation-Helps-Parkinson-s-Institute",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "3/7/2022 2:41:20 PM",
"tags": [{
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "/TeamlogicIT/media/TLIT-Images/Resources/Case%20Studies/CountyAppraiser_CaseStudy_2022.pdf?ext=.pdf",
"id": "ae191516-722d-43f6-8c20-fe0fc72f5f74",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Cybersecurity|Information Security",
"industry": "Legal Services",
"title": "TeamLogic IT Enables County Appraiser’s Office to Endure Natural Disasters, Deflect Ransomware",
"truncatedTitle": "TeamLogic IT Enables County Appraiser’s ...",
"content": "<p><b><i>Floridians are famous for enduring hurricanes but in this digital age, another threat to Florida’s people and businesses looms—not in the physical world, but in the virtual realm: ransomware. </i></b></p>\r\n",
"truncatedContent": "Floridians are famous for enduring hurricanes but in this digital age, another threat to Florida’s people and businesses looms—not in the physical world, ...",
"link": "/longmontco612/Resources/TeamLogic-IT-Enables-County-Appraiser-s-Office-to",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "3/7/2022 2:38:16 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "Legal Services",
"link": "?industries=Legal Services"
}]
}, {
"download": "/TeamlogicIT/media/TLIT-Images/Resources/Case%20Studies/AeronauticsSchool_CaseStudy_2022.pdf?ext=.pdf",
"id": "0a74ff2a-a3f4-45f5-99c6-57c2c25235ea",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Cloud Computing",
"industry": "Education",
"title": "Aeronautics School Flies in the Cloud with Huge Boost from TeamLogic IT",
"truncatedTitle": "Aeronautics School Flies in the Cloud with ...",
"content": "<p><b><i>In aviation, airplanes have got to fly. If an airplane sits on the ground it is costing the owner money. </i></b></p>\r\n",
"truncatedContent": "In aviation, airplanes have got to fly. If an airplane sits on the ground it is costing the owner money. \r\n ",
"link": "/longmontco612/Resources/Aeronautics-School-Flies-in-the-Cloud-with-Huge-Bo",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "3/7/2022 2:25:03 PM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "Education",
"link": "?industries=Education"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/Wall-Street-Business-Makes-a-Move-to-Managed-IT-Se/TLIT-Wall-Street_Case-Study_2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "fad987b2-28f1-41e4-97cd-ad7e6ab1dd78",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Managed Services",
"industry": "Financial & Insurance",
"title": "Wall Street Business Makes a Move to Managed IT Services",
"truncatedTitle": "Wall Street Business Makes a Move to Managed ...",
"content": "<p><br />\r\nProviding great IT service takes skills beyond technical ability, such as project management, communication, and the ability to think and act quickly when things don’t go as planned. </p>\r\n",
"truncatedContent": "\r\nProviding great IT service takes skills beyond technical ability, such as project management, communication, and the ability to think and act quickly ...",
"link": "/longmontco612/Resources/Wall-Street-Business-Makes-a-Move-to-Managed-IT-Se",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "3/7/2022 2:20:37 PM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/Tips-for-Balancing-Security-and-Productivity-in-To/TLTipSheet_WFHSecurityandProductivity_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "9d384de3-4c7f-4379-a534-aaf1bc09e99b",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Tip Sheets",
"topic": "Remote workforce",
"industry": "Financial & Insurance",
"title": "Tips for Balancing Security and Productivity in Today's Work-From-Home Environment",
"truncatedTitle": "Tips for Balancing Security and Productivity ...",
"content": "<p>Hackers are capitalizing on the global shift to working from home. A security-first approach keeps your employees productive and your company safe.</p>\r\n",
"truncatedContent": "Hackers are capitalizing on the global shift to working from home. A security-first approach keeps your employees productive and your company safe.\r\n ",
"link": "/longmontco612/Resources/Tips-for-Balancing-Security-and-Productivity-in-To",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "3/7/2022 2:16:39 PM",
"tags": [{
"name": "Remote workforce",
"link": "?topic=Remote workforce"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "/TeamlogicIT/media/TLIT-Images/Resources/Info%20Sheets/TLIT-National-Accounts-Info-Sheet_2022.pdf?ext=.pdf",
"id": "43a1ab85-83a9-4619-8ea2-5ea240469899",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Managed Services",
"industry": "Accounting",
"title": "National Account Program",
"truncatedTitle": "National Account Program ",
"content": "<p>TeamLogic IT is a national provider of technology solutions for companies of all sizes. We have been ranked a top managed services provider by key business and industry sources.</p>\r\n",
"truncatedContent": "TeamLogic IT is a national provider of technology solutions for companies of all sizes. We have been ranked a top managed services provider by key business ...",
"link": "/longmontco612/Resources/National-Account-Program",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "3/7/2022 2:10:06 PM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/The-Logical-Advantage-October-2021-Issue-1-1-1-2/LogicalAdvantage_Mar2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "137929b6-1d1e-451b-a184-268429be42d0",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Cybersecurity|Information Security",
"industry": "General-All",
"title": "The Logical Advantage March 2022 Issue",
"truncatedTitle": "The Logical Advantage March 2022 Issue ",
"content": "<p><b>Balancing Your Cybersecurity Playbook, Clarifying Cybersecurity Buzzwords, Ask These Cybersecurity Questions Often</b></p>\r\n",
"truncatedContent": "Balancing Your Cybersecurity Playbook, Clarifying Cybersecurity Buzzwords, Ask These Cybersecurity Questions Often\r\n ",
"link": "/longmontco612/Resources/The-Logical-Advantage-October-2021-Issue-1-1-1-2",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "3/2/2022 7:46:17 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "cf10345a-9c9d-4c4d-962b-432a405f4ff9",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "The Basics of Cyber Insurance ",
"truncatedTitle": "The Basics of Cyber Insurance ",
"content": "<em><img alt=\"cyberinsurance.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/The-Basics-of-Cyber-Insurance/cyberinsurance.jpg.aspx?width=128&height=71\" style=\"width: 128px; height: 71px; float: right;\" title=\"cyberinsurance.jpg\" />Accelerated by the pandemic in recent years, the rate of cybercrime continues to rise, and the cost to companies of all types and sizes is escalating along with it. Global losses from cybercrimes topped $1 trillion in 2020 and climbed to $6 trillion last year, according to studies by the venture capital firm Cybersecurity Ventures and software maker McAfee.</em>",
"truncatedContent": "Accelerated by the pandemic in recent years, the rate of cybercrime continues to rise, and the cost to companies of all types and sizes is escalating ...",
"link": "/longmontco612/Resources/The-Basics-of-Cyber-Insurance",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/a0c08fd6-371c-4f7d-b364-cd9b157b2b4c/attachment.aspx",
"postDate": "3/1/2022 8:00:00 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "e0f158cd-4597-4c1b-8437-bf4f539c9794",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Prepare, Don’t Pay, for Ransomware",
"truncatedTitle": "Prepare, Don’t Pay, for Ransomware ",
"content": "<em><img alt=\"ransomeware.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Tightly-Aligned-Cybersecurity-Training-1-1-1-1-3/ransomeware.jpg.aspx?width=128&height=68\" style=\"width: 128px; height: 68px; float: left;\" title=\"ransomeware.jpg\" />Pick your cybersecurity study. All make the same point: Ransomware rates are rising rapidly with no signs of slowing soon. So how do you cope with this risk to your organization’s operations and financial stability?<br />\r\nCybersecurity experts and enforcement agencies discourage paying ransoms as a means of mitigating risks or controlling costs.</em>",
"truncatedContent": "Pick your cybersecurity study. All make the same point: Ransomware rates are rising rapidly with no signs of slowing soon. So how do you cope with this ...",
"link": "/longmontco612/Resources/Tightly-Aligned-Cybersecurity-Training-1-1-1-1-3",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/4201babf-f704-4aed-b5f7-dc7e756c45b7/attachment.aspx",
"postDate": "2/22/2022 8:00:36 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "2a30051f-eeea-44ce-bd90-5d2bc0dde7c7",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Construction & Contracting|General-All",
"title": "Ransomware Payments are Rising",
"truncatedTitle": "Ransomware Payments are Rising ",
"content": "Inflation also appears to be on the rise when it comes to ransomware. Suspected ransomware payments nearly doubled last year, according to an October report from the U.S. Treasury Department.",
"truncatedContent": "Inflation also appears to be on the rise when it comes to ransomware. Suspected ransomware payments nearly doubled last year, according to an October ...",
"link": "/longmontco612/Resources/Tightly-Aligned-Cybersecurity-Training-1-1-1-1-2",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/ac026753-808e-4086-841c-ac46fc56a9a7/attachment.aspx",
"postDate": "2/15/2022 8:00:36 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Construction & Contracting",
"link": "?industries=Construction & Contracting"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/The-Logical-Advantage-October-2021-Issue-1-1-1-1/LogicalAdvantage_Feb2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "aba47525-8093-4b51-a105-ae264a623e67",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Cybersecurity|Information Security",
"industry": "General-All",
"title": "The Logical Advantage February 2022 Issue",
"truncatedTitle": "The Logical Advantage February 2022 Issue ",
"content": "<p><b>Ransomware Remains Rampant, Reject Paying Ransoms, Prepare, Don't Pay, for Ransomware</b></p>\r\n",
"truncatedContent": "Ransomware Remains Rampant, Reject Paying Ransoms, Prepare, Don't Pay, for Ransomware\r\n ",
"link": "/longmontco612/Resources/The-Logical-Advantage-October-2021-Issue-1-1-1-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "2/1/2022 8:00:34 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/The-Logical-Advantage-October-2021-Issue-1-1-1/LogicalAdvantage_Jan2022-1.pdf.aspx?lang=en-US&ext=.pdf",
"id": "b4d61c4c-87f9-434a-8854-a21d7ca79c79",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Cybersecurity|Outsourcing IT",
"industry": "General-All",
"title": "The Logical Advantage January 2022 Issue",
"truncatedTitle": "The Logical Advantage January 2022 Issue ",
"content": "<p><b>Cybersecurity Persists as Priority, 3 Pillars of Cybersecurity Resilience, Taking \"Zero Trust\" to the Next Level</b></p>\r\n",
"truncatedContent": "Cybersecurity Persists as Priority, 3 Pillars of Cybersecurity Resilience, Taking \"Zero Trust\" to the Next Level\r\n ",
"link": "/longmontco612/Resources/The-Logical-Advantage-October-2021-Issue-1-1-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/9a742df1-a965-46b9-8144-26f1494b6bd2/attachment.aspx",
"postDate": "1/1/2022 8:00:34 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "83d8623f-c9a4-48cb-bd93-fa10aa25ae37",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Is Your Business Ready for Ransomware?",
"truncatedTitle": "Is Your Business Ready for Ransomware? ",
"content": "<img alt=\"ransomware.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Is-Your-Business-Ready-for-Ransomware/ransomware.jpg.aspx?width=128&height=68\" style=\"width: 128px; height: 68px; float: left;\" title=\"ransomware.jpg\" />A midyear survey by the international IT association ISACA, revealed that nearly half of its 1,200 members polled regard ransomware as a cyber threat that likely will impact their organization in the next 12 months.<br />\r\n ",
"truncatedContent": "A midyear survey by the international IT association ISACA, revealed that nearly half of its 1,200 members polled regard ransomware as a cyber threat ...",
"link": "/longmontco612/Resources/Is-Your-Business-Ready-for-Ransomware",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/28/2021 8:00:00 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "f7f877de-3d0c-419a-9b53-e0cb4a502fcc",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Trends",
"industry": "General-All",
"title": "Transforming to Hybrid Cloud Strategy",
"truncatedTitle": "Transforming to Hybrid Cloud Strategy ",
"content": "<img alt=\"hybrid-cloud.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Transforming-to-Hybrid-Cloud-Strategy/hybrid-cloud.jpg.aspx?width=128&height=71\" style=\"width: 128px; height: 71px; float: left;\" title=\"hybrid-cloud.jpg\" />“A 2012 data strategy cannot survive in our current world,” argues database expert Rob Woollen in <em>Datamation</em> magazine.<br />\r\n ",
"truncatedContent": "“A 2012 data strategy cannot survive in our current world,” argues database expert Rob Woollen in Datamation magazine.\r\n ",
"link": "/longmontco612/Resources/Transforming-to-Hybrid-Cloud-Strategy",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/052ef8c3-32d1-412e-8033-dac28d7d4db4/attachment.aspx",
"postDate": "12/14/2021 8:05:23 AM",
"tags": [{
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "0f7d6417-1827-4356-ba7e-2213e429effb",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Co-managed IT Services",
"industry": "General-All",
"title": "7 Transformative IT Leadership Skills",
"truncatedTitle": "7 Transformative IT Leadership Skills ",
"content": "<em><img alt=\"itleadership.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/7-Transformative-IT-Leadership-Skills/itleadership.jpg.aspx?width=128&height=85\" style=\"width: 128px; height: 85px; float: left;\" title=\"itleadership.jpg\" />“Successful digital transformations don’t happen without organization-wide effort, mindset and process changes, and the right technologies,” writes columnist Esther Shein for CIO magazine. She continues, “They also don’t happen without guidance” from transformative leadership.</em>",
"truncatedContent": "“Successful digital transformations don’t happen without organization-wide effort, mindset and process changes, and the right technologies,” writes columnist ...",
"link": "/longmontco612/Resources/7-Transformative-IT-Leadership-Skills",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/f503aecb-3612-4a55-959e-cbbd2b2b5b78/attachment.aspx",
"postDate": "12/7/2021 8:00:59 AM",
"tags": [{
"name": "Co-managed IT Services",
"link": "?topic=Co-managed IT Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/The-Logical-Advantage-October-2021-Issue-1-1/TLIT-Logical-Advantage_Dec2021.pdf.aspx?lang=en-US&ext=.pdf",
"id": "a16a84f3-2fef-4ee2-b936-26b052b5dcbb",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Business Continuity|Cybersecurity",
"industry": "General-All",
"title": "The Logical Advantage December 2021 Issue",
"truncatedTitle": "The Logical Advantage December 2021 Issue ",
"content": "<p><b>How’s Your Digital Transformation?, 7 Transformative IT Leadership Skills, Transforming to Hybrid Cloud Strategy</b></p>\r\n",
"truncatedContent": "How’s Your Digital Transformation?, 7 Transformative IT Leadership Skills, Transforming to Hybrid Cloud Strategy\r\n ",
"link": "/longmontco612/Resources/The-Logical-Advantage-October-2021-Issue-1-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/318fd3fe-9787-423a-8c1f-7d3b4299544e/attachment.aspx",
"postDate": "12/1/2021 8:00:34 AM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "ce0653f4-735a-40f3-b438-320abe0c57b7",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Business Continuity",
"industry": "General-All",
"title": "How’s Your Digital Transformation?",
"truncatedTitle": "How’s Your Digital Transformation? ",
"content": "<img alt=\"itleadership.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/How-s-Your-Digital-Transformation/itleadership.jpg.aspx?width=128&height=71\" style=\"width: 128px; height: 71px; float: left;\" title=\"itleadership.jpg\" />In January – about midway through the pandemic era – management consulting firm McKinsey & Company made a series of projections about trends that would “characterize 2021.” Among those was the pace of what popularly is called “digital transformation.”<br />\r\n ",
"truncatedContent": "In January – about midway through the pandemic era – management consulting firm McKinsey & Company made a series of projections about trends that would ...",
"link": "/longmontco612/Resources/How-s-Your-Digital-Transformation",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/d760f5c6-4de0-45ed-b6ab-59fd42901076/attachment.aspx",
"postDate": "11/30/2021 8:15:21 AM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "7ee9a4b2-af8f-466d-bbff-052534435272",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Your Best Cyber Defense? Training Humans",
"truncatedTitle": "Your Best Cyber Defense? Training Humans ",
"content": "<img alt=\"cyberdefense.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Your-Best-Cyber-Defense-Training-Humans/cyberdefense.jpg.aspx?width=128&height=71\" style=\"width: 128px; height: 71px; float: left;\" title=\"cyberdefense.jpg\" />During 2021’s first six months, more than 75% of cybersecurity threats were delivered by email messages, per research conducted by HP. This trend coincides with a 65% increase year over year in the use of hacking tools downloaded from underground forums and filesharing websites, HP analysts say.<br />\r\n ",
"truncatedContent": "During 2021’s first six months, more than 75% of cybersecurity threats were delivered by email messages, per research conducted by HP. This trend coincides ...",
"link": "/longmontco612/Resources/Your-Best-Cyber-Defense-Training-Humans",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/7c1ce6a3-9ab1-4a4b-965a-d7f9db09c2ec/attachment.aspx",
"postDate": "11/23/2021 8:20:14 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "0e218f19-50ed-423b-91a4-c68284f11e41",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Briefs & Whitepapers",
"topic": "Managed Services",
"industry": "General-All",
"title": "Managed Services Fortify Your Help Desk",
"truncatedTitle": "Managed Services Fortify Your Help Desk ",
"content": "Recent studies reinforce the link between office productivity and timely IT support.<br />\r\n ",
"truncatedContent": "Recent studies reinforce the link between office productivity and timely IT support.\r\n ",
"link": "/longmontco612/Resources/Managed-Services-Fortify-Your-Help-Desk",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/e212c33b-e3dc-457b-984d-835617242877/attachment.aspx",
"postDate": "11/16/2021 8:00:25 AM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "866e7648-64ab-4413-8f85-97e284dad535",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Compliance",
"industry": "General-All",
"title": "How Strong is Your Cyber-Resilience?",
"truncatedTitle": "How Strong is Your Cyber-Resilience? ",
"content": "<img alt=\"strong.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/How-Strong-is-Your-Cyber-Resilience/strong.jpg.aspx?width=128&height=75\" style=\"width: 128px; height: 75px; float: left;\" title=\"strong.jpg\" />“As digital-first becomes the norm, we can no longer take a purely defensive stance against cyber-attacks,” Emily Heath, DocuSign’s Chief Trust & Security Officer writes for <em>Protocol</em>, a tech news service from the publishers of <em>Politico</em>.<br />\r\n ",
"truncatedContent": "“As digital-first becomes the norm, we can no longer take a purely defensive stance against cyber-attacks,” Emily Heath, DocuSign’s Chief Trust & Security ...",
"link": "/longmontco612/Resources/How-Strong-is-Your-Cyber-Resilience",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/7274b152-ed05-4ae1-bcff-65d98e6b7066/attachment.aspx",
"postDate": "11/9/2021 8:33:53 AM",
"tags": [{
"name": "Compliance",
"link": "?topic=Compliance"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "62609bf3-285e-4325-a7d6-d01c500e67ee",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Study Reveals “Zero Trust” Works",
"truncatedTitle": "Study Reveals “Zero Trust” Works ",
"content": "<img alt=\"zerotrust.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Study-Reveals-Zero-Trust-Works/zerotrust.jpg.aspx?width=128&height=71\" style=\"width: 128px; height: 71px; float: left;\" title=\"zerotrust.jpg\" />Earlier this year, IBM’s annual Cost of a Data Breach Report delivered evidence that applying “Zero Trust” cybersecurity can reduce the average cost of a data breach.<br />\r\n ",
"truncatedContent": "Earlier this year, IBM’s annual Cost of a Data Breach Report delivered evidence that applying “Zero Trust” cybersecurity can reduce the average cost ...",
"link": "/longmontco612/Resources/Study-Reveals-Zero-Trust-Works",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/7209edff-0588-4559-aa10-f90b829620d2/attachment.aspx",
"postDate": "11/2/2021 8:00:44 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/The-Logical-Advantage-October-2021-Issue-1/TLIT-Logical-Advantage_Nov2021.pdf.aspx?lang=en-US&ext=.pdf",
"id": "e180056f-62ec-4579-8059-829d144fcfb8",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Business Continuity|Cybersecurity",
"industry": "General-All",
"title": "The Logical Advantage November 2021 Issue",
"truncatedTitle": "The Logical Advantage November 2021 Issue ",
"content": "<p><b>Study Reveals “Zero Trust” Works</b><b>, How Strong is Your Cyber-Resilience?, Managed Services Fortify Your Help Desk</b></p>\r\n",
"truncatedContent": "Study Reveals “Zero Trust” Works, How Strong is Your Cyber-Resilience?, Managed Services Fortify Your Help Desk\r\n ",
"link": "/longmontco612/Resources/The-Logical-Advantage-October-2021-Issue-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/4e7abff6-5331-4ba4-94b8-936d2d3a0761/attachment.aspx",
"postDate": "11/1/2021 8:00:34 AM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "ef57649f-f121-4bfc-bbc7-2d530bcff4d0",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Best Practices for Preventing Ransomware",
"truncatedTitle": "Best Practices for Preventing Ransomware ",
"content": "<img alt=\"preventransomeware.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Best-Practices-for-Preventing-Ransomware/preventransomeware.jpg.aspx?width=128&height=76\" style=\"width: 128px; height: 76px; float: left;\" title=\"preventransomeware.jpg\" />Most of us have heard the adage: “An ounce of prevention is worth a pound of cure.”<br />\r\n<br />\r\nIn the case of ransomware – malware that infects, locks or seizes control of business systems until ransom is paid – ratios trend much greater than the 16-to-1 proposition in the axiom.<br />\r\n ",
"truncatedContent": "Most of us have heard the adage: “An ounce of prevention is worth a pound of cure.”\r\n\r\nIn the case of ransomware – malware that infects, locks or seizes ...",
"link": "/longmontco612/Resources/Best-Practices-for-Preventing-Ransomware",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/cdffe7bf-c59f-4df8-9e28-cad876c1604c/attachment.aspx",
"postDate": "10/26/2021 8:15:54 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "b390aa96-5d7c-4bc5-8751-b7e564093d77",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Defining “Zero Trust” Cybersecurity",
"truncatedTitle": "Defining “Zero Trust” Cybersecurity ",
"content": "<img alt=\"cybersecurity.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Defining-Zero-Trust-Cybersecurity/cybersecurity.jpg.aspx?width=128&height=85\" style=\"width: 128px; height: 85px; float: left;\" title=\"cybersecurity.jpg\" />Scan headlines in tech magazines today and, surely, you’ll find dozens of references to “Zero Trust” cybersecurity. But what you won’t see is a single definition of the concept.<br />\r\n ",
"truncatedContent": "Scan headlines in tech magazines today and, surely, you’ll find dozens of references to “Zero Trust” cybersecurity. But what you won’t see is a single ...",
"link": "/longmontco612/Resources/Defining-Zero-Trust-Cybersecurity",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/cfe2b859-5f10-4ada-8128-690bb779c296/attachment.aspx",
"postDate": "10/19/2021 8:20:20 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "990487f0-1a07-4941-8707-663e1be1257b",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Lift “Cybersecurity Maturity” in 7 Steps",
"truncatedTitle": "Lift “Cybersecurity Maturity” in 7 Steps ",
"content": "<img alt=\"maturity.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Lift-Cybersecurity-Maturity-in-7-Steps/maturity.jpg.aspx?width=128&height=87\" style=\"width: 128px; height: 87px; float: left;\" title=\"maturity.jpg\" />Earlier this year, IBM’s annual Cost of a Data Breach Report delivered evidence that applying “Zero Trust” cybersecurity can reduce the average cost of a data breach.<br />\r\n ",
"truncatedContent": "Earlier this year, IBM’s annual Cost of a Data Breach Report delivered evidence that applying “Zero Trust” cybersecurity can reduce the average cost ...",
"link": "/longmontco612/Resources/Lift-Cybersecurity-Maturity-in-7-Steps",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/898f9ed4-abfe-4e71-b2e0-5e17a97c2693/attachment.aspx",
"postDate": "10/12/2021 8:00:46 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "ccb4cc64-c5df-41b2-9276-c7162a1d80e6",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Cybersecurity Rises Among U.S. Priorities",
"truncatedTitle": "Cybersecurity Rises Among U.S. Priorities ",
"content": "<img alt=\"security.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Cybersecurity-Rises-Among-U-S-Priorities/security.jpg.aspx?width=128&height=81\" style=\"width: 128px; height: 81px; float: left;\" title=\"security.jpg\" />Midway through this summer, the Cybersecurity and Infrastructure Agency, part of the U.S. Department of Homeland Security, unveiled a new initiative called the Joint Cyber Defense Collaborative.<br />\r\n ",
"truncatedContent": "Midway through this summer, the Cybersecurity and Infrastructure Agency, part of the U.S. Department of Homeland Security, unveiled a new initiative ...",
"link": "/longmontco612/Resources/Cybersecurity-Rises-Among-U-S-Priorities",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/bf4326c5-5028-4df6-a3f3-f95cadc43281/attachment.aspx",
"postDate": "10/5/2021 8:11:22 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/The-Logical-Advantage-October-2021-Issue/TLIT-Logical-Advantage_Oct2021-1.pdf.aspx?lang=en-US&ext=.pdf",
"id": "c1f867ce-2921-4fbb-93ad-3fdfa286b30b",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Business Continuity|Cybersecurity",
"industry": "General-All",
"title": "The Logical Advantage October 2021 Issue",
"truncatedTitle": "The Logical Advantage October 2021 Issue ",
"content": "<p><b>Cybersecurity Rises Among U.S. Priorities, Lift “Cybersecurity Maturity” in 7 Steps, Defining “Zero Trust” Cybersecurity</b></p>\r\n",
"truncatedContent": "Cybersecurity Rises Among U.S. Priorities, Lift “Cybersecurity Maturity” in 7 Steps, Defining “Zero Trust” Cybersecurity\r\n ",
"link": "/longmontco612/Resources/The-Logical-Advantage-October-2021-Issue",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/acb4a18a-eb59-46f0-9e3b-b3257ae9ec5c/attachment.aspx",
"postDate": "10/1/2021 8:00:34 AM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "a3a92ac2-c16d-4c54-b2c9-d4376b017ee8",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Ransomware on the Rise & Evolving",
"truncatedTitle": "Ransomware on the Rise & Evolving ",
"content": "<img alt=\"ransom.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Ransomware-on-the-Rise-Evolving/ransom.jpg.aspx?width=128&height=88\" style=\"width: 128px; height: 88px; float: left;\" title=\"ransom.jpg\" />Incidence of ransomware, a form of digital extortion perpetrated by cyber criminals, has been rising since the onset of the COVID-19 pandemic last year, coinciding with the expansion of remote work.",
"truncatedContent": "Incidence of ransomware, a form of digital extortion perpetrated by cyber criminals, has been rising since the onset of the COVID-19 pandemic last year, ...",
"link": "/longmontco612/Resources/Ransomware-on-the-Rise-Evolving",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/bdf35f11-952e-4eae-a36c-7e8e4bd8292c/attachment.aspx",
"postDate": "9/28/2021 8:00:00 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "7be423be-d5a4-4179-a2e2-7f261abb89a7",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Outsourcing IT",
"industry": "General-All",
"title": "Sharpen Your IT Infrastructure’s “Edge”",
"truncatedTitle": "Sharpen Your IT Infrastructure’s “Edge” ",
"content": "<img alt=\"infrastructure.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Sharpen-Your-IT-Infrastructure-s-Edge/infrastructure.jpg.aspx?width=128&height=95\" style=\"width: 128px; height: 95px; float: left;\" title=\"infrastructure.jpg\" />The future of work is a hybrid model – where employees operate remotely a few days a week – as researchers predict more than a third of post-pandemic workers will opt to stay at home to some degree.<br />\r\n ",
"truncatedContent": "The future of work is a hybrid model – where employees operate remotely a few days a week – as researchers predict more than a third of post-pandemic ...",
"link": "/longmontco612/Resources/Sharpen-Your-IT-Infrastructure-s-Edge",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/e8d33202-1e7c-47ca-9bb9-8e165e7ad4d8/attachment.aspx",
"postDate": "9/21/2021 8:00:00 AM",
"tags": [{
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "6dbee091-7800-4cd9-8c81-05a32a00c039",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Outsourcing IT",
"industry": "General-All",
"title": "Leading, not Just Managing, IT Change",
"truncatedTitle": "Leading, not Just Managing, IT Change ",
"content": "<img alt=\"leading.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Leading-not-Just-Managing-IT-Change/leading.jpg.aspx?width=128&height=76\" style=\"width: 128px; height: 76px; float: left;\" title=\"leading.jpg\" />According to the global technology trade association CompTIA, eight of 10 organizations surveyed believe an “IT skills gap” affects at least one area of their business, such as productivity or customer service.",
"truncatedContent": "According to the global technology trade association CompTIA, eight of 10 organizations surveyed believe an “IT skills gap” affects at least one area ...",
"link": "/longmontco612/Resources/Leading-not-Just-Managing-IT-Change",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/c6470293-1e55-42f8-ba2a-04a2f7c9c01c/attachment.aspx",
"postDate": "9/14/2021 8:00:00 AM",
"tags": [{
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/13a3eed1-e428-470a-b408-7808340f8d58/LogicalAdvantage_Sep2021.pdf.aspx?lang=en-US&ext=.pdf",
"id": "5d75ef45-e3c7-4114-828a-cdf08d7e8019",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Cybersecurity|Remote workforce",
"industry": "General-All",
"title": "The Logical Advantage September 2021 Issue ",
"truncatedTitle": "The Logical Advantage September 2021 Issue ...",
"content": "Looking to 2022's Biggest IT Challege, Leading Not Just Managing IT Change, Sharpen Your IT Infrastructure’s “Edge”\r\n<p> </p>\r\n",
"truncatedContent": "Looking to 2022's Biggest IT Challege, Leading Not Just Managing IT Change, Sharpen Your IT Infrastructure’s “Edge”\r\n \r\n ",
"link": "/longmontco612/Resources/The-Logical-Advantage-September-2021-Issue",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/b7fc11e9-da6b-472d-b7cf-f4298cd88073/attachment.aspx",
"postDate": "9/1/2021 10:00:00 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Remote workforce",
"link": "?topic=Remote workforce"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "f1979e81-85ec-449e-a371-16c42c40508f",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Trends",
"industry": "General-All",
"title": "Looking to 2022’s Biggest IT Challenge",
"truncatedTitle": "Looking to 2022’s Biggest IT Challenge ",
"content": "<img alt=\"challenge.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Looking-to-2022-s-Biggest-IT-Challenge/challenge.jpg.aspx?width=128&height=85\" style=\"width: 128px; height: 85px; float: left;\" title=\"challenge.jpg\" />Some business operators consider September the unofficial start of the year’s 4<sup>th</sup> quarter, as the year’s final months feature considerable holiday time. So, many executives commence next year’s planning cycle now instead of waiting for Q4.",
"truncatedContent": "Some business operators consider September the unofficial start of the year’s 4th quarter, as the year’s final months feature considerable holiday time. ...",
"link": "/longmontco612/Resources/Looking-to-2022-s-Biggest-IT-Challenge",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/a0464c5e-0cb9-4349-ab13-0fcf94d27fd2/attachment.aspx",
"postDate": "8/23/2021 8:00:00 AM",
"tags": [{
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "75a3ccf6-00a1-4b08-821b-685702a51b05",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Business Continuity",
"industry": "General-All",
"title": "3 Convenient Un-Truths About Disaster Recovery",
"truncatedTitle": "3 Convenient Un-Truths About Disaster Recovery ",
"content": "<img alt=\"disaster recovery un-truths\" src=\"/uploadedImages/TeamLogic_IT/Content/Blog/Blogs/thumb_ThinkstockPhotos-485968411.jpg\" style=\"float: right;\" title=\"disaster recovery un-truths\" /> To most SMBs, DR is the familiar acronym for Disaster Recovery, an area of security planning in which companies document the processes and procedures they will take to protect (and quickly restore) IT infrastructure following a catastrophic natural or human",
"truncatedContent": " To most SMBs, DR is the familiar acronym for Disaster Recovery, an area of security planning in which companies document the processes and procedures ...",
"link": "/longmontco612/Resources/3-Convenient-Un-Truths-About-Disaster-Recovery-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "n/a",
"image": "/getattachment/a7c51ac6-8b2f-4244-8307-81aaeb717f2b/attachment.aspx",
"postDate": "8/18/2021 10:49:21 AM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "2141b06e-58df-419b-98c3-454b63c32988",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Managed Services",
"industry": "General-All",
"title": "When and How to Dispose Old Computer Equipment",
"truncatedTitle": "When and How to Dispose Old Computer Equipment ",
"content": "<img alt=\"dispose old computer equipment\" src=\"/uploadedImages/TeamLogic_IT/Content/Blog/Blogs/thumb_dispose-old-computer-equipment.jpg\" style=\"float: right;\" title=\"dispose old computer equipment\" />It’s a special day when you get a new desktop or get the opportunity to switch to a lighter and more capable laptop. While transferring files and switching passwords can be a bit challenging, the payoff of a faster and",
"truncatedContent": "It’s a special day when you get a new desktop or get the opportunity to switch to a lighter and more capable laptop. While transferring files and switching ...",
"link": "/longmontco612/Resources/When-and-How-to-Dispose-Old-Computer-Equipment-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "n/a",
"image": "/getattachment/5e2b07e1-fa4c-456a-a6f0-88746510f77f/attachment.aspx",
"postDate": "8/11/2021 10:43:49 AM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "1cf372ad-7a91-4b4b-b209-c8a020e91f5e",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Managed Services",
"industry": "Healthcare",
"title": "4 Signs You Need a New IT Managed Services Provider",
"truncatedTitle": "4 Signs You Need a New IT Managed Services ...",
"content": "<img alt=\"new managed it services provider\" border=\"0\" src=\"/uploadedImages/TeamLogic_IT/Content/Blog/Blogs/thumb_GettyImages-137088169.jpg\" style=\"float: right;\" title=\"new managed it services provider\" />Are you getting the full value that you’re paying for in your current managed IT services provider? Here are four telltale signs that justify switching to someone new.",
"truncatedContent": "Are you getting the full value that you’re paying for in your current managed IT services provider? Here are four telltale signs that justify switching ...",
"link": "/longmontco612/Resources/4-Signs-You-Need-a-New-IT-Managed-Services-Pro-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "n/a",
"image": "/getattachment/337de191-7262-4762-8852-5efc4951c732/attachment.aspx",
"postDate": "8/4/2021 10:24:21 AM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "/getattachment/b4b1a360-c086-4e8f-bfb2-9217d293287a/LogicalAdvantage_Aug2021.pdf.aspx?lang=en-US&ext=.pdf",
"id": "83f64610-b4e0-4a6a-9973-26b85803436a",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Cybersecurity|Remote workforce",
"industry": "General-All",
"title": "The Logical Advantage August 2021 Issue ",
"truncatedTitle": "The Logical Advantage August 2021 Issue ...",
"content": "Pursuing Resiliency Over Recoverability, IT Services for Digital Transformation, 3 Tips for Optimizing Managed Services ",
"truncatedContent": "Pursuing Resiliency Over Recoverability, IT Services for Digital Transformation, 3 Tips for Optimizing Managed Services ",
"link": "/longmontco612/Resources/The-Logical-Advantage-August-2021-Issue",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/7464a604-b11d-4c56-aa9d-91cbc30190da/attachment.aspx",
"postDate": "8/1/2021 10:00:00 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Remote workforce",
"link": "?topic=Remote workforce"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "e6eb697e-59a7-46fc-b594-b31b70732c46",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "Surviving the Pandemic Phishing Phrenzy",
"truncatedTitle": "Surviving the Pandemic Phishing Phrenzy ",
"content": "<img alt=\"phishing.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Surviving-the-Pandemic-Phishing-Phrenzy/phishing.jpg.aspx?width=128&height=68\" style=\"width: 128px; height: 68px; float: left;\" title=\"phishing.jpg\" />Phishing – defined simply as sending fake email to steal personal credentials – is a form of social engineering, which <em>CSO</em> magazine describes as the “art of exploiting human psychology, rather than technical hacking techniques.” Instead of searching for vulnerabilities in applications or networks, cyber criminals seek vulnerable employees.",
"truncatedContent": "Phishing – defined simply as sending fake email to steal personal credentials – is a form of social engineering, which CSO magazine describes as the ...",
"link": "/longmontco612/Resources/Surviving-the-Pandemic-Phishing-Phrenzy",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/e37b71de-22de-43e4-b1a4-f93a574ead16/attachment.aspx",
"postDate": "7/28/2021 10:00:00 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "85787773-0487-4dfd-b84b-cd6da1926834",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Business Continuity",
"industry": "General-All",
"title": "Back-to-Business Continuity Basics",
"truncatedTitle": "Back-to-Business Continuity Basics ",
"content": "<em><img alt=\"welcome.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/Back-to-Business-Continuity-Basics/welcome.jpg.aspx?width=128&height=95\" style=\"width: 128px; height: 95px; float: left;\" title=\"welcome.jpg\" />CIO</em> magazine defines business continuity as “maintaining business functions or quickly resuming them in the event of a major disruption” – e.g., natural disaster, malicious cyberattack, viral pandemic, etc.",
"truncatedContent": "CIO magazine defines business continuity as “maintaining business functions or quickly resuming them in the event of a major disruption” – e.g., natural ...",
"link": "/longmontco612/Resources/Back-to-Business-Continuity-Basics",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/042b3032-5854-4012-b211-32f61b5e60d0/attachment.aspx",
"postDate": "7/21/2021 10:00:00 AM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "70b4b412-2f32-493a-a2e6-275893cef851",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Outsourcing IT",
"industry": "General-All",
"title": "3 Practices That Sabotage IT Strategy",
"truncatedTitle": "3 Practices That Sabotage IT Strategy ",
"content": "<img alt=\"sabotage.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/3-Practices-That-Sabotage-IT-Strategy/sabotage.jpg.aspx?width=128&height=91\" style=\"width: 128px; height: 91px; float: left;\" title=\"sabotage.jpg\" />As economies around the world work their way out of the pandemic, companies across the spectrum of businesses are investing in IT outsourcing again.",
"truncatedContent": "As economies around the world work their way out of the pandemic, companies across the spectrum of businesses are investing in IT outsourcing again. ",
"link": "/longmontco612/Resources/3-Practices-That-Sabotage-IT-Strategy",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/9e2f0d80-63a6-4a5d-9d38-d8bf132350cb/attachment.aspx",
"postDate": "7/14/2021 10:00:00 AM",
"tags": [{
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/c0ed4561-0d92-4788-b260-84fc708cca04/LogicalAdvantage_Jul2021.pdf.aspx?lang=en-US&ext=.pdf",
"id": "d321716a-1fec-44ab-8413-6c24b864fa16",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Outsourcing IT|Remote workforce",
"industry": "General-All",
"title": "The Logical Advantage July 2021 Issue",
"truncatedTitle": "The Logical Advantage July 2021 Issue ",
"content": "The \"Hybrid Workforce\" Is Here to Stay, 3 Practices That Sabotage IT Strategy, Back-to- Business Continuity Basics",
"truncatedContent": "The \"Hybrid Workforce\" Is Here to Stay, 3 Practices That Sabotage IT Strategy, Back-to- Business Continuity Basics ",
"link": "/longmontco612/Resources/The-Logical-Advantage-July-2021",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/12b991c4-46d6-44fe-88ea-442444ab0968/attachment.aspx",
"postDate": "7/12/2021 3:09:35 PM",
"tags": [{
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "Remote workforce",
"link": "?topic=Remote workforce"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "b5e72e63-4630-40b3-ac12-8773cef15a32",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Remote workforce",
"industry": "General-All",
"title": "The “Hybrid Workforce” Is Here to Stay",
"truncatedTitle": "The “Hybrid Workforce” Is Here to Stay ",
"content": "<img alt=\"hypbrid1.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/The-Hybrid-Workforce-Is-Here-to-Stay/hypbrid1.jpg.aspx?width=128&height=95\" style=\"width: 128px; height: 95px; float: left;\" title=\"hypbrid1.jpg\" />Per a study covered by <em>Human Resource Executive</em>, the hybrid workforce – i.e., a mix of employees working remotely and from office locations – will become standard operating procedure for businesses as the U.S. economy works its way out of the pandemic.",
"truncatedContent": "Per a study covered by Human Resource Executive, the hybrid workforce – i.e., a mix of employees working remotely and from office locations – will become ...",
"link": "/longmontco612/Resources/The-Hybrid-Workforce-Is-Here-to-Stay",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/d4c60e2f-c0e3-49bc-ac03-34690c808216/attachment.aspx",
"postDate": "7/7/2021 11:15:45 AM",
"tags": [{
"name": "Remote workforce",
"link": "?topic=Remote workforce"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "72e59398-f81b-43b4-ab3d-a149d7769fc7",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Managed Services",
"industry": "Healthcare|General-All",
"title": "A Case for IT Managed Services Providers (MSPs)",
"truncatedTitle": "A Case for IT Managed Services Providers ...",
"content": "<p>At a time when businesses of all shapes and sizes face the greatest pressure to generate the highest value from technology, the pursuit to partner with a reputable MSP has higher stakes and is more challenging than ever before. That's why business leaders must consider some critical questions to find the support and expertise needed, to help find answers.</p>\r\n",
"truncatedContent": "At a time when businesses of all shapes and sizes face the greatest pressure to generate the highest value from technology, the pursuit to partner with ...",
"link": "/longmontco612/Resources/A-Case-for-IT-Managed-Services-Providers-MSPs",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "n/a",
"image": "/getattachment/a6560b1e-7802-462c-b7d7-914d77ed6193/attachment.aspx",
"postDate": "6/30/2021 2:40:31 AM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "6d974512-3f2d-4e00-af60-3d9b8a77e00d",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Financial & Insurance",
"title": "Cybersecurity’s Future is Passwordless",
"truncatedTitle": "Cybersecurity’s Future is Passwordless ",
"content": "What is passwordless authentication? In simple terms, passwordless techniques shun elaborate sequences of numbers, letters and symbols in favor of some combination of a public identifier (username, email address, phone number) and secure proof of identity.",
"truncatedContent": "What is passwordless authentication? In simple terms, passwordless techniques shun elaborate sequences of numbers, letters and symbols in favor of some ...",
"link": "/longmontco612/Resources/Cybersecurity-s-Future-is-Passwordless",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/04fb8ff1-181c-4432-baec-c568124a709b/attachment.aspx",
"postDate": "6/16/2021 4:44:48 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/The-Logical-Advantage-June-2021-Issue/LogicalAdvantage_Jun2021-(3).pdf.aspx?lang=en-US&ext=.pdf",
"id": "47fb738c-5db6-4123-9462-328312c963f0",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "The Logical Advantage June 2021 Issue",
"truncatedTitle": "The Logical Advantage June 2021 Issue ",
"content": "Zero Trust Cybersecurity Here to Stay, How to Turst No One in Cyberspace, Cybersecurity's Future is \"Passwordless\"",
"truncatedContent": "Zero Trust Cybersecurity Here to Stay, How to Turst No One in Cyberspace, Cybersecurity's Future is \"Passwordless\" ",
"link": "/longmontco612/Resources/The-Logical-Advantage-June-2021-Issue",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/bfc12b20-4163-4d0d-92cb-96cd0a660f42/attachment.aspx",
"postDate": "6/11/2021 2:03:53 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/The-Logical-Advantage-May-2021-Issue/LogicalAdvantage_May2021-(1).pdf.aspx?lang=en-US&ext=.pdf",
"id": "7338030a-ceef-434f-9d76-ad5684d183dd",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Managed Services",
"industry": "General-All",
"title": "The Logical Advantage May 2021 Issue",
"truncatedTitle": "The Logical Advantage May 2021 Issue ",
"content": "Hybrid Working is Here to Stay, Shedding Light on Shadow IT, Hybrid Workplaces Should Work for All",
"truncatedContent": "Hybrid Working is Here to Stay, Shedding Light on Shadow IT, Hybrid Workplaces Should Work for All ",
"link": "/longmontco612/Resources/The-Logical-Advantage-May-2021-Issue",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/40983336-a20d-4930-a485-02a551b17066/attachment.aspx",
"postDate": "6/11/2021 2:01:00 PM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/The-Logical-Advantage-April-2021-Issue/LogicalAdvantage_Apr2021-(1).pdf.aspx?lang=en-US&ext=.pdf",
"id": "fecd2566-c94a-4629-88e3-0cadbcc8eba7",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Cloud Computing|Managed Services",
"industry": "General-All",
"title": "The Logical Advantage April 2021 Issue",
"truncatedTitle": "The Logical Advantage April 2021 Issue ",
"content": "Making Your Own Normal Post-Pandemic, Leadership Skills for Transformative IT, 3 Ways to Avoid Cloud Migration Limbo",
"truncatedContent": "Making Your Own Normal Post-Pandemic, Leadership Skills for Transformative IT, 3 Ways to Avoid Cloud Migration Limbo ",
"link": "/longmontco612/Resources/The-Logical-Advantage-April-2021-Issue",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/c57c6929-8997-48cf-90bc-36e6db9b07b0/attachment.aspx",
"postDate": "6/11/2021 1:48:39 PM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "29afaaff-9ccf-4a17-9713-938b0db3bc3b",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Legal Services",
"title": "How to Trust No One in Cyberspace",
"truncatedTitle": "How to Trust No One in Cyberspace ",
"content": "<em>CSO Magazine</em> columnist Mary K. Pratt describes “Zero Trust” as a “security concept centered on the belief that organizations should not automatically trust anything <em>inside </em>or <em>outside </em>[their] perimeters and instead must verify anything and everything trying to connect to systems before granting access.”",
"truncatedContent": "CSO Magazine columnist Mary K. Pratt describes “Zero Trust” as a “security concept centered on the belief that organizations should not automatically ...",
"link": "/longmontco612/Resources/How-to-Trust-No-One-in-Cyberspace",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/dc09ceb1-1247-46dc-8152-a0b321992bf1/attachment.aspx",
"postDate": "6/9/2021 4:56:57 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Legal Services",
"link": "?industries=Legal Services"
}]
}, {
"download": "",
"id": "37537f78-92b1-46bb-b66a-9a20509f133a",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Healthcare",
"title": "3 Essential “Zero Trust” Best Practices",
"truncatedTitle": "3 Essential “Zero Trust” Best Practices ",
"content": "Earlier this year, U.S. Treasury Secretary Janet Yellen warned of an “explosion” of cybercrime risk fueled by the COVID-driven move to remote lifestyles. Per a report by <em>BBC News</em>, Yellen said: “As the pandemic has moved more of life online, crime has moved with it.”",
"truncatedContent": "Earlier this year, U.S. Treasury Secretary Janet Yellen warned of an “explosion” of cybercrime risk fueled by the COVID-driven move to remote lifestyles. ...",
"link": "/longmontco612/Resources/3-Essential-Zero-Trust-Best-Practices",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/52c2d7b6-ca05-493c-8e7f-607a1c28ae15/attachment.aspx",
"postDate": "6/8/2021 11:48:32 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "/getattachment/2c30ef4e-1383-4dd2-a700-937cffb75b38/LogicalAdvantage_Mar2021.pdf.aspx?lang=en-US&ext=.pdf",
"id": "f63b4d60-094e-44f2-88fb-5c24ad0909ca",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Trends",
"industry": "General-All",
"title": "The Logical Advantage | March 2021 Issue",
"truncatedTitle": "The Logical Advantage | March 2021 Issue ",
"content": "Warning: ATO-Based Email Attacks Rising<br />\r\n5 Ways to Avoid an Ex-Staffer's Wrath<br />\r\n4 Ways to Shore Up Remote-Worker Security",
"truncatedContent": "Warning: ATO-Based Email Attacks Rising\r\n5 Ways to Avoid an Ex-Staffer's Wrath\r\n4 Ways to Shore Up Remote-Worker Security ",
"link": "/longmontco612/Resources/The-Logical-Advantage-March-2021-Issue",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/1/2021 12:15:10 PM",
"tags": [{
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/bb3ace21-6b0b-4751-a242-0813ce1c37fc/LogicalAdvantage_Feb2021.pdf.aspx?lang=en-US&ext=.pdf",
"id": "0d447546-14d3-4e89-8680-763436228328",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Trends",
"industry": "General-All",
"title": "The Logical Advantage | February 2021 Issue",
"truncatedTitle": "The Logical Advantage | February 2021 Issue ",
"content": "Virtual Assistants: Look Before You Leap<br />\r\n4 Ways Printers Expose Your Enterprise<br />\r\nEmbrace Your Data, Enrich Your Business",
"truncatedContent": "Virtual Assistants: Look Before You Leap\r\n4 Ways Printers Expose Your Enterprise\r\nEmbrace Your Data, Enrich Your Business ",
"link": "/longmontco612/Resources/The-Logical-Advantage-February-2021-Issue",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/1/2021 12:13:15 PM",
"tags": [{
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/8be8fa2e-073a-4803-9d23-7538a6c9a50f/LogicalAdvantage_Jan2021.pdf.aspx?lang=en-US&ext=.pdf",
"id": "72ed15c6-e12f-4566-9917-297cc22dd3e9",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Trends",
"industry": "General-All",
"title": "The Logical Advantage | January 2021 Issue",
"truncatedTitle": "The Logical Advantage | January 2021 Issue ",
"content": "6 Top Security and Risk Management Trends<br />\r\nHow Supplemental IT Services Make Your Business More Competitive<br />\r\nCountering the 4 Most LIkely Cyberattacks",
"truncatedContent": "6 Top Security and Risk Management Trends\r\nHow Supplemental IT Services Make Your Business More Competitive\r\nCountering the 4 Most LIkely Cyberattacks ",
"link": "/longmontco612/Resources/Technology-Trends",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/1/2021 12:09:34 PM",
"tags": [{
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "4fc01fe9-2fac-4648-b546-ab45570d3d17",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Healthcare",
"title": "Zero Trust, Cybersecurity is Here to Stay",
"truncatedTitle": "Zero Trust, Cybersecurity is Here to Stay ",
"content": "This remote staff requires higher attention, as the multiplication of “endpoints” multiplies vulnerabilities and, in turn, the risks of data breaches. In short, every connected device — desktop, laptop, tablet, router and phone — is a potential threat that should not be trusted as secure.",
"truncatedContent": "This remote staff requires higher attention, as the multiplication of “endpoints” multiplies vulnerabilities and, in turn, the risks of data breaches. ...",
"link": "/longmontco612/Resources/Zero-Trust-Cybersecurity-is-Here-to-Stay",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/68b31d2c-32ca-4d5d-a06a-e91444b000ab/attachment.aspx",
"postDate": "6/1/2021 11:05:05 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "/TeamlogicIT/media/TLIT-Images/Resources/Info%20Sheets/TLIT-Cloud-Services-Info-Sheet_2022.pdf?ext=.pdf",
"id": "9c53120f-8fd8-44e5-afdd-f901703aab3e",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Cloud Computing",
"industry": "Legal Services",
"title": "Cloud Readiness Assessment",
"truncatedTitle": "Cloud Readiness Assessment ",
"content": "A TeamLogic IT cloud services readiness assessment will determine if your business has the bandwidth, reliability and security to access cloud services. We review your applications, data and infrastrucutre and recommend strategies for cloud migration",
"truncatedContent": "A TeamLogic IT cloud services readiness assessment will determine if your business has the bandwidth, reliability and security to access cloud services. ...",
"link": "/longmontco612/Resources/Cloud-Readiness-Assessment",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "5/26/2021 8:37:44 AM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "Legal Services",
"link": "?industries=Legal Services"
}]
}, {
"download": "",
"id": "de1118b8-e3b0-4711-b06e-9f4197472010",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Legal Services|Financial & Insurance",
"title": "Who's Hacking Your Hybrid Workplace",
"truncatedTitle": "Who's Hacking Your Hybrid Workplace ",
"content": "Hackers continue to assault hybrid workplaces –i.e., IT environments supporting mixed in-person and remote activity – as companies scramble to secure them. Just one successful data breach can cost large companies millions and put a small or mid-size ones out of business.",
"truncatedContent": "Hackers continue to assault hybrid workplaces –i.e., IT environments supporting mixed in-person and remote activity – as companies scramble to secure ...",
"link": "/longmontco612/Resources/Who-s-Hacking-Your-Hybrid-Workplace",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/57195187-78c8-4bd5-add6-95a1af964c21/attachment.aspx",
"postDate": "5/26/2021 5:34:37 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Legal Services",
"link": "?industries=Legal Services"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "41cbc301-426d-4fc2-bb2c-f37fd75f5277",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Healthcare",
"title": "Shedding Light on “Shadow IT”",
"truncatedTitle": "Shedding Light on “Shadow IT” ",
"content": "Gartner explains shadow IT as, \"IT devices, software and services outside the ownership or control of IT management.\" Why is it risky? This article shares reasons from the most recent findings. ",
"truncatedContent": "Gartner explains shadow IT as, \"IT devices, software and services outside the ownership or control of IT management.\" Why is it risky? This article shares ...",
"link": "/longmontco612/Resources/Shedding-Light-on-Shadow-IT",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/7dfac7b2-0df3-4184-92af-c48ee0268bb1/attachment.aspx",
"postDate": "5/19/2021 3:56:26 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "",
"id": "d86d421f-8c2f-412b-9555-08356279ba8b",
"isGated": true,
"isBlog": false,
"isFeatured": false,
"category": "Briefs & Whitepapers",
"topic": "Cybersecurity",
"industry": "Education",
"title": "Managed Security: A Guide to Understanding The Children's Internet Protection Act (CIPA)",
"truncatedTitle": "Managed Security: A Guide to Understanding ...",
"content": "<p>The Internet is a great and powerful tool and provides users access to volumes of information on virtually any topic. It makes doing research quick and easy and can be used as an important learning tool for children. Unfortunately, it can also be misused and children can too easily locate undesirable information that could be harmful to minors and put them at risk and make them vulnerable to dangerous people. </p>\r\n",
"truncatedContent": "The Internet is a great and powerful tool and provides users access to volumes of information on virtually any topic. It makes doing research quick and ...",
"link": "/longmontco612/Resources/Managed-Security-A-Guide-to-Understanding-The-Chil",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "5/17/2021 11:11:50 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Education",
"link": "?industries=Education"
}]
}, {
"download": "",
"id": "b681e26f-9e62-43c3-bbb0-e122383c6d49",
"isGated": true,
"isBlog": false,
"isFeatured": false,
"category": "Briefs & Whitepapers",
"topic": "Business Continuity",
"industry": "Healthcare",
"title": "Manage Your Email Before IT Manages You",
"truncatedTitle": "Manage Your Email Before IT Manages You ",
"content": "<p>Is your email system helping or hindering your business? Effective email management is a requirement for protecting your business. Improper management can be costly in terms of lost productivity, including the time required to search for files and the hours required to reproduce any lost documents or information. </p>\r\n",
"truncatedContent": "Is your email system helping or hindering your business? Effective email management is a requirement for protecting your business. Improper management ...",
"link": "/longmontco612/Resources/Manage-Your-Email-Before-IT-Manages-You",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/29d6329c-4106-443e-9afd-94a8c261891e/attachment.aspx",
"postDate": "5/17/2021 11:05:29 AM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "",
"id": "b03b0858-05fe-4760-8dfd-7012f1b7d437",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Trends",
"industry": "Non-Profit|Education",
"title": "Hybrid Workplaces Should Work for All",
"truncatedTitle": "Hybrid Workplaces Should Work for All ",
"content": "Even as the pandemic wanes, companies of all kinds still face maintaining hybrid working environments that best fit their businesses. Plus, managing the procurement, implementation and maintenance of business technology that facilitates that workplace.",
"truncatedContent": "Even as the pandemic wanes, companies of all kinds still face maintaining hybrid working environments that best fit their businesses. Plus, managing ...",
"link": "/longmontco612/Resources/Hybrid-Workplaces-Should-Work-for-All",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/8ca41ef2-f590-4d29-b134-a8682e027649/attachment.aspx",
"postDate": "5/12/2021 4:48:57 AM",
"tags": [{
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "Non-Profit",
"link": "?industries=Non-Profit"
}, {
"name": "Education",
"link": "?industries=Education"
}]
}, {
"download": "",
"id": "f572d5f1-16be-4f1b-b7e7-e633cdbbe7e2",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Trends",
"industry": "Non-Profit|Accounting",
"title": "Studies Say Hybrid Working is Here to Stay",
"truncatedTitle": "Studies Say Hybrid Working is Here to Stay ",
"content": "Nearly every organization must provide some form of hybrid workplace that enables fluid operations between working from the office and working just about anywhere else at any time.",
"truncatedContent": "Nearly every organization must provide some form of hybrid workplace that enables fluid operations between working from the office and working just about ...",
"link": "/longmontco612/Resources/Studies-Say-Hybrid-Working-is-Here-to-Stay",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/54115feb-478a-4267-9ab7-44f068f8e2f9/attachment.aspx",
"postDate": "5/4/2021 2:53:36 PM",
"tags": [{
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "Non-Profit",
"link": "?industries=Non-Profit"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "",
"id": "7e8c8797-e51a-4049-b02b-10230d8a1434",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Financial & Insurance",
"title": "Dealing with Post Pandemic Cybercrooks",
"truncatedTitle": "Dealing with Post Pandemic Cybercrooks ",
"content": "<br />\r\nFrom the earliest days of COVID-19, cybercrooks tapped fear, uncertainty and doubt to scam people.",
"truncatedContent": "\r\nFrom the earliest days of COVID-19, cybercrooks tapped fear, uncertainty and doubt to scam people. ",
"link": "/longmontco612/Resources/Combating-Post-Pandemic-Social-Engineering",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/ef35473f-17a8-4ffa-a21c-93aa683edf9e/attachment.aspx",
"postDate": "4/28/2021 4:45:13 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "4c0acb99-d226-441e-b8c7-3f8c5bc36516",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cloud Computing",
"industry": "Financial & Insurance",
"title": "3 Ways to Avoid Cloud Migration Limbo",
"truncatedTitle": "3 Ways to Avoid Cloud Migration Limbo ",
"content": "IT spending devoted to public, private and hybrid solutions continues to escalate more than a year after COVID-19 struck, disrupting operations across the spectrum of U.S. businesses. So, how do you ensure your organization's successful migration to cloud computing?",
"truncatedContent": "IT spending devoted to public, private and hybrid solutions continues to escalate more than a year after COVID-19 struck, disrupting operations across ...",
"link": "/longmontco612/Resources/3-Ways-to-Avoid-Cloud-Migration-Limbo",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/05f79544-901d-400b-a432-73adef7f8925/attachment.aspx",
"postDate": "4/21/2021 11:11:45 AM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "9d76eed5-2455-42d6-b3c7-c82406b862ec",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Managed Services",
"industry": "Accounting",
"title": "Leadership Skills for Transformative IT",
"truncatedTitle": "Leadership Skills for Transformative IT ",
"content": "The last year coping with the economic impact of a global pandemic leaves no doubt transforming digital operations is critical to success for any business. And, regardless of title or department, as a leader in your organization you share responsibility for building your company’s post-pandemic future through the smart use of technology.",
"truncatedContent": "The last year coping with the economic impact of a global pandemic leaves no doubt transforming digital operations is critical to success for any business. ...",
"link": "/longmontco612/Resources/Leadership-Skills-for-Transformative-IT",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/e4a23547-100b-469a-a613-d13abd6a5d80/attachment.aspx",
"postDate": "4/13/2021 11:57:00 AM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "",
"id": "9d76eed5-2455-42d6-b3c7-c82406b862ec",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Managed Services",
"industry": "Accounting",
"title": "Leadership Skills for Transformative IT",
"truncatedTitle": "Leadership Skills for Transformative IT ",
"content": "The last year coping with the economic impact of a global pandemic leaves no doubt transforming digital operations is critical to success for any business. And, regardless of title or department, as a leader in your organization you share responsibility for building your company’s post-pandemic future through the smart use of technology.",
"truncatedContent": "The last year coping with the economic impact of a global pandemic leaves no doubt transforming digital operations is critical to success for any business. ...",
"link": "/longmontco612/Resources/Leadership-Skills-for-Transformative-IT-2",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/e4a23547-100b-469a-a613-d13abd6a5d80/attachment.aspx",
"postDate": "4/13/2021 11:57:00 AM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "",
"id": "9d76eed5-2455-42d6-b3c7-c82406b862ec",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Managed Services",
"industry": "Accounting",
"title": "Leadership Skills for Transformative IT",
"truncatedTitle": "Leadership Skills for Transformative IT ",
"content": "The last year coping with the economic impact of a global pandemic leaves no doubt transforming digital operations is critical to success for any business. And, regardless of title or department, as a leader in your organization you share responsibility for building your company’s post-pandemic future through the smart use of technology.",
"truncatedContent": "The last year coping with the economic impact of a global pandemic leaves no doubt transforming digital operations is critical to success for any business. ...",
"link": "/longmontco612/Resources/Leadership-Skills-for-Transformative-IT-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/e4a23547-100b-469a-a613-d13abd6a5d80/attachment.aspx",
"postDate": "4/13/2021 11:57:00 AM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "",
"id": "71930e69-92c6-4254-afd3-687d963626b9",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Trends",
"industry": "Healthcare",
"title": "Ready to Make Your Own \"Normal\" Post-Pandemic?",
"truncatedTitle": "Ready to Make Your Own \"Normal\" Post-Pandemic? ",
"content": "A recent survey conducted of nearly 400 IT leaders from IBM, reported that they felt the necessary technology wasn't in place for the future. The following article outlines some of the details from that survey.",
"truncatedContent": "A recent survey conducted of nearly 400 IT leaders from IBM, reported that they felt the necessary technology wasn't in place for the future. The following ...",
"link": "/longmontco612/Resources/Ready-to-Make-Your-Own-Normal-Post-Pandemic",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/0179a8cc-fcfd-44a7-84ec-3c2b76ce250a/attachment.aspx",
"postDate": "4/6/2021 11:39:33 AM",
"tags": [{
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "",
"id": "71930e69-92c6-4254-afd3-687d963626b9",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Trends",
"industry": "Healthcare",
"title": "Ready to Make Your Own \"Normal\" Post-Pandemic?",
"truncatedTitle": "Ready to Make Your Own \"Normal\" Post-Pandemic? ",
"content": "A recent survey conducted of nearly 400 IT leaders from IBM, reported that they felt the necessary technology wasn't in place for the future. The following article outlines some of the details from that survey.",
"truncatedContent": "A recent survey conducted of nearly 400 IT leaders from IBM, reported that they felt the necessary technology wasn't in place for the future. The following ...",
"link": "/longmontco612/Resources/Ready-to-Make-Your-Own-Normal-Post-Pandemic-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/0179a8cc-fcfd-44a7-84ec-3c2b76ce250a/attachment.aspx",
"postDate": "4/6/2021 11:39:33 AM",
"tags": [{
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "",
"id": "20851f08-b633-46d8-82aa-47782884533b",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Healthcare",
"title": "3 Trends Shaping Cyber Defense Decisions",
"truncatedTitle": "3 Trends Shaping Cyber Defense Decisions ",
"content": "Spending on cybersecurity infrastructure is rising, yet the threat of attacks and breaches continues to escalate at a mind-boggling pace.",
"truncatedContent": "Spending on cybersecurity infrastructure is rising, yet the threat of attacks and breaches continues to escalate at a mind-boggling pace. ",
"link": "/longmontco612/Resources/3-Trends-Shaping-Cyber-Defense-Decisions",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "n/a",
"image": null,
"postDate": "3/30/2021 12:55:08 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "",
"id": "e4aca159-f4a1-4d88-be9c-2b381732ec75",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Accounting",
"title": "Continuous Education Can Help Fill the Cybersecurity Talent Gap",
"truncatedTitle": "Continuous Education Can Help Fill the ...",
"content": "Treating today’s cybersecurity challenges like technical matters is tempting. After all, the perpetrators of cyberattacks such as ransomware launch their assaults in the virtual world. But as we’ve argued many times in this blog space, cybersecurity is more human dilemma than mechanical trial. So, managing cybersecurity is more about managing talent than managing machines.",
"truncatedContent": "Treating today’s cybersecurity challenges like technical matters is tempting. After all, the perpetrators of cyberattacks such as ransomware launch their ...",
"link": "/longmontco612/Resources/Continuous-Education-Can-Help-Fill-the-Cyberse-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/84106a38-b580-4742-9759-c6e44fe1117d/attachment.aspx",
"postDate": "3/23/2021 9:13:53 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "",
"id": "b9e2d754-11ef-4ef8-a1ad-3e8766a66727",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity|Remote workforce",
"industry": "Education",
"title": "4 Ways to Shore-Up Remote-Worker Security",
"truncatedTitle": "4 Ways to Shore-Up Remote-Worker Security ",
"content": "Most businesses have employees who work remotely. But as their numbers increase, so too do the security risks. To safeguard their data (and yours) against a devastating cyberattack, we recommend giving remote workers the tools, training and support they need.",
"truncatedContent": "Most businesses have employees who work remotely. But as their numbers increase, so too do the security risks. To safeguard their data (and yours) against ...",
"link": "/longmontco612/Resources/4-Ways-to-Shore-Up-Remote-Worker-Security",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/183451b8-524b-4da1-a747-cb38f106b8d1/attachment.aspx",
"postDate": "3/17/2021 11:34:33 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Remote workforce",
"link": "?topic=Remote workforce"
}, {
"name": "Education",
"link": "?industries=Education"
}]
}, {
"download": "",
"id": "7659461d-52af-42c3-b115-4c982e8a34eb",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Financial & Insurance",
"title": "5 Ways to Avoid an Ex-Staffers’ Wrath",
"truncatedTitle": "5 Ways to Avoid an Ex-Staffers’ Wrath ",
"content": "The moment current employees become ex-employees they become a potential security threat. Depending on the circumstances of the separation, most simply move on without incident. Operative word: most. To safeguard against the fraction of those who may try to extract revenge, HR and IT can pair-up for effective incident prevention.",
"truncatedContent": "The moment current employees become ex-employees they become a potential security threat. Depending on the circumstances of the separation, most simply ...",
"link": "/longmontco612/Resources/5-Ways-to-Avoid-an-Ex-Staffers-Wrath",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/76980661-f703-4fb0-ad8e-aa81c9a5792e/attachment.aspx",
"postDate": "3/9/2021 9:00:05 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "7659461d-52af-42c3-b115-4c982e8a34eb",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Financial & Insurance",
"title": "5 Ways to Avoid an Ex-Staffers’ Wrath",
"truncatedTitle": "5 Ways to Avoid an Ex-Staffers’ Wrath ",
"content": "The moment current employees become ex-employees they become a potential security threat. Depending on the circumstances of the separation, most simply move on without incident. Operative word: most. To safeguard against the fraction of those who may try to extract revenge, HR and IT can pair-up for effective incident prevention.",
"truncatedContent": "The moment current employees become ex-employees they become a potential security threat. Depending on the circumstances of the separation, most simply ...",
"link": "/longmontco612/Resources/5-Ways-to-Avoid-an-Ex-Staffers-Wrath-2",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/76980661-f703-4fb0-ad8e-aa81c9a5792e/attachment.aspx",
"postDate": "3/9/2021 9:00:05 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "7659461d-52af-42c3-b115-4c982e8a34eb",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Financial & Insurance",
"title": "5 Ways to Avoid an Ex-Staffers’ Wrath",
"truncatedTitle": "5 Ways to Avoid an Ex-Staffers’ Wrath ",
"content": "The moment current employees become ex-employees they become a potential security threat. Depending on the circumstances of the separation, most simply move on without incident. Operative word: most. To safeguard against the fraction of those who may try to extract revenge, HR and IT can pair-up for effective incident prevention.",
"truncatedContent": "The moment current employees become ex-employees they become a potential security threat. Depending on the circumstances of the separation, most simply ...",
"link": "/longmontco612/Resources/5-Ways-to-Avoid-an-Ex-Staffers-Wrath-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/76980661-f703-4fb0-ad8e-aa81c9a5792e/attachment.aspx",
"postDate": "3/9/2021 9:00:05 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "4b78f248-0728-44ec-ab44-ed39d5278f68",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Financial & Insurance",
"title": "Account Takeover (ATO) Based Email Attacks on the Rise",
"truncatedTitle": "Account Takeover (ATO) Based Email Attacks ...",
"content": "The specter of email-driven Account Takeovers (ATO) is growing, reports Information Age, and businesses would do well to increase their understanding of this insidious threat, so they can take steps to prevent its destructive fallout.",
"truncatedContent": "The specter of email-driven Account Takeovers (ATO) is growing, reports Information Age, and businesses would do well to increase their understanding ...",
"link": "/longmontco612/Resources/Account-Takeover-ATO-Based-Email-Attacks-on-the",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/d2f4a620-f379-4921-b7c5-58996316cfa0/attachment.aspx",
"postDate": "3/2/2021 2:16:56 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "4b78f248-0728-44ec-ab44-ed39d5278f68",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Financial & Insurance",
"title": "Account Takeover (ATO) Based Email Attacks on the Rise",
"truncatedTitle": "Account Takeover (ATO) Based Email Attacks ...",
"content": "The specter of email-driven Account Takeovers (ATO) is growing, reports Information Age, and businesses would do well to increase their understanding of this insidious threat, so they can take steps to prevent its destructive fallout.",
"truncatedContent": "The specter of email-driven Account Takeovers (ATO) is growing, reports Information Age, and businesses would do well to increase their understanding ...",
"link": "/longmontco612/Resources/Account-Takeover-ATO-Based-Email-Attacks-on-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/d2f4a620-f379-4921-b7c5-58996316cfa0/attachment.aspx",
"postDate": "3/2/2021 2:16:56 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "4b78f248-0728-44ec-ab44-ed39d5278f68",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Financial & Insurance",
"title": "Account Takeover (ATO) Based Email Attacks on the Rise",
"truncatedTitle": "Account Takeover (ATO) Based Email Attacks ...",
"content": "The specter of email-driven Account Takeovers (ATO) is growing, reports Information Age, and businesses would do well to increase their understanding of this insidious threat, so they can take steps to prevent its destructive fallout.",
"truncatedContent": "The specter of email-driven Account Takeovers (ATO) is growing, reports Information Age, and businesses would do well to increase their understanding ...",
"link": "/longmontco612/Resources/Account-Takeover-ATO-Based-Email-Attacks-on-2",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/d2f4a620-f379-4921-b7c5-58996316cfa0/attachment.aspx",
"postDate": "3/2/2021 2:16:56 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "0f836ad7-76d2-44de-abf0-6881da622258",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Financial & Insurance",
"title": "How to Maintain Network Security When IT People Bail ",
"truncatedTitle": "How to Maintain Network Security When IT ...",
"content": "When an IT person leaves, the stakes are arguably much higher. One less watchman on the (fire)wall instantly exposes your network security and your business to a wide range of risks, threats and vulnerabilities, any one of which carries potentially catastrophic consequences.",
"truncatedContent": "When an IT person leaves, the stakes are arguably much higher. One less watchman on the (fire)wall instantly exposes your network security and your business ...",
"link": "/longmontco612/Resources/How-to-Maintain-Network-Security-When-IT-Peopl-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/cf9716db-205e-44ca-b5af-c9a1680f5183/attachment.aspx",
"postDate": "2/23/2021 10:49:18 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "0f836ad7-76d2-44de-abf0-6881da622258",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Financial & Insurance",
"title": "How to Maintain Network Security When IT People Bail ",
"truncatedTitle": "How to Maintain Network Security When IT ...",
"content": "When an IT person leaves, the stakes are arguably much higher. One less watchman on the (fire)wall instantly exposes your network security and your business to a wide range of risks, threats and vulnerabilities, any one of which carries potentially catastrophic consequences.",
"truncatedContent": "When an IT person leaves, the stakes are arguably much higher. One less watchman on the (fire)wall instantly exposes your network security and your business ...",
"link": "/longmontco612/Resources/How-to-Maintain-Network-Security-When-IT-Peopl-2",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/cf9716db-205e-44ca-b5af-c9a1680f5183/attachment.aspx",
"postDate": "2/23/2021 10:49:18 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "d260c699-ba57-40b1-b8f4-46aad4406523",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Data/Voice/Connectivity|Trends",
"industry": "Manufacturing & Distribution",
"title": "Embrace Your Data, Enrich Your Business",
"truncatedTitle": "Embrace Your Data, Enrich Your Business ",
"content": "Forbes cited that “data driven organizations are 23 times more likely to acquire customers, six times as likely to retain those customers, and 19 times as likely to be profitable as a result.”",
"truncatedContent": "Forbes cited that “data driven organizations are 23 times more likely to acquire customers, six times as likely to retain those customers, and 19 times ...",
"link": "/longmontco612/Resources/Embrace-Your-Data-Enrich-Your-Business",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/98ac0a2d-f209-46c8-b5a2-8d6729e3bfeb/attachment.aspx",
"postDate": "2/16/2021 12:11:18 PM",
"tags": [{
"name": "Data/Voice/Connectivity",
"link": "?topic=Data/Voice/Connectivity"
}, {
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "Manufacturing & Distribution",
"link": "?industries=Manufacturing & Distribution"
}]
}, {
"download": "",
"id": "d260c699-ba57-40b1-b8f4-46aad4406523",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Data/Voice/Connectivity|Trends",
"industry": "Manufacturing & Distribution",
"title": "Embrace Your Data, Enrich Your Business",
"truncatedTitle": "Embrace Your Data, Enrich Your Business ",
"content": "Forbes cited that “data driven organizations are 23 times more likely to acquire customers, six times as likely to retain those customers, and 19 times as likely to be profitable as a result.”",
"truncatedContent": "Forbes cited that “data driven organizations are 23 times more likely to acquire customers, six times as likely to retain those customers, and 19 times ...",
"link": "/longmontco612/Resources/Embrace-Your-Data-Enrich-Your-Business-2",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/98ac0a2d-f209-46c8-b5a2-8d6729e3bfeb/attachment.aspx",
"postDate": "2/16/2021 12:11:18 PM",
"tags": [{
"name": "Data/Voice/Connectivity",
"link": "?topic=Data/Voice/Connectivity"
}, {
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "Manufacturing & Distribution",
"link": "?industries=Manufacturing & Distribution"
}]
}, {
"download": "",
"id": "d260c699-ba57-40b1-b8f4-46aad4406523",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Data/Voice/Connectivity|Trends",
"industry": "Manufacturing & Distribution",
"title": "Embrace Your Data, Enrich Your Business",
"truncatedTitle": "Embrace Your Data, Enrich Your Business ",
"content": "Forbes cited that “data driven organizations are 23 times more likely to acquire customers, six times as likely to retain those customers, and 19 times as likely to be profitable as a result.”",
"truncatedContent": "Forbes cited that “data driven organizations are 23 times more likely to acquire customers, six times as likely to retain those customers, and 19 times ...",
"link": "/longmontco612/Resources/Embrace-Your-Data-Enrich-Your-Business-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/98ac0a2d-f209-46c8-b5a2-8d6729e3bfeb/attachment.aspx",
"postDate": "2/16/2021 12:11:18 PM",
"tags": [{
"name": "Data/Voice/Connectivity",
"link": "?topic=Data/Voice/Connectivity"
}, {
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "Manufacturing & Distribution",
"link": "?industries=Manufacturing & Distribution"
}]
}, {
"download": "",
"id": "3fb67ae3-dca4-43f9-9cff-238b76beff99",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Legal Services",
"title": "4 Ways Printers Expose Your Enterprise",
"truncatedTitle": "4 Ways Printers Expose Your Enterprise ",
"content": "No matter how vigilant your team may be, motivated intruders will find ways to evade your defenses and penetrate enterprise networks. Weakly guarded endpoints, unpatched servers, and careless mobile users are favored targets.",
"truncatedContent": "No matter how vigilant your team may be, motivated intruders will find ways to evade your defenses and penetrate enterprise networks. Weakly guarded ...",
"link": "/longmontco612/Resources/4-Ways-Printers-Expose-Your-Enterprise-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/0648c168-cc80-47c4-84da-dfa5d066b7ac/attachment.aspx",
"postDate": "2/9/2021 3:15:17 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Legal Services",
"link": "?industries=Legal Services"
}]
}, {
"download": "",
"id": "3fb67ae3-dca4-43f9-9cff-238b76beff99",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Legal Services",
"title": "4 Ways Printers Expose Your Enterprise",
"truncatedTitle": "4 Ways Printers Expose Your Enterprise ",
"content": "No matter how vigilant your team may be, motivated intruders will find ways to evade your defenses and penetrate enterprise networks. Weakly guarded endpoints, unpatched servers, and careless mobile users are favored targets.",
"truncatedContent": "No matter how vigilant your team may be, motivated intruders will find ways to evade your defenses and penetrate enterprise networks. Weakly guarded ...",
"link": "/longmontco612/Resources/4-Ways-Printers-Expose-Your-Enterprise-2",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/0648c168-cc80-47c4-84da-dfa5d066b7ac/attachment.aspx",
"postDate": "2/9/2021 3:15:17 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Legal Services",
"link": "?industries=Legal Services"
}]
}, {
"download": "",
"id": "3fb67ae3-dca4-43f9-9cff-238b76beff99",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Legal Services",
"title": "4 Ways Printers Expose Your Enterprise",
"truncatedTitle": "4 Ways Printers Expose Your Enterprise ",
"content": "No matter how vigilant your team may be, motivated intruders will find ways to evade your defenses and penetrate enterprise networks. Weakly guarded endpoints, unpatched servers, and careless mobile users are favored targets.",
"truncatedContent": "No matter how vigilant your team may be, motivated intruders will find ways to evade your defenses and penetrate enterprise networks. Weakly guarded ...",
"link": "/longmontco612/Resources/4-Ways-Printers-Expose-Your-Enterprise",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/0648c168-cc80-47c4-84da-dfa5d066b7ac/attachment.aspx",
"postDate": "2/9/2021 3:15:17 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Legal Services",
"link": "?industries=Legal Services"
}]
}, {
"download": "",
"id": "35bca37d-5eb7-420c-9943-110a43da203e",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Trends",
"industry": "Manufacturing & Distribution",
"title": "Virtual Assistants: Look Before You Leap",
"truncatedTitle": "Virtual Assistants: Look Before You Leap ",
"content": "Studies have predicted that the AI-powered digital assistance market, which includes voice enablement, may grow to more than seven billion devices.",
"truncatedContent": "Studies have predicted that the AI-powered digital assistance market, which includes voice enablement, may grow to more than seven billion devices. ",
"link": "/longmontco612/Resources/Virtual-Assistants-Look-Before-You-Leap",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/5d8a8049-86c3-4627-9062-12360909596f/attachment.aspx",
"postDate": "2/2/2021 2:13:18 PM",
"tags": [{
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "Manufacturing & Distribution",
"link": "?industries=Manufacturing & Distribution"
}]
}, {
"download": "",
"id": "35bca37d-5eb7-420c-9943-110a43da203e",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Trends",
"industry": "Manufacturing & Distribution",
"title": "Virtual Assistants: Look Before You Leap",
"truncatedTitle": "Virtual Assistants: Look Before You Leap ",
"content": "Studies have predicted that the AI-powered digital assistance market, which includes voice enablement, may grow to more than seven billion devices.",
"truncatedContent": "Studies have predicted that the AI-powered digital assistance market, which includes voice enablement, may grow to more than seven billion devices. ",
"link": "/longmontco612/Resources/Virtual-Assistants-Look-Before-You-Leap-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/5d8a8049-86c3-4627-9062-12360909596f/attachment.aspx",
"postDate": "2/2/2021 2:13:18 PM",
"tags": [{
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "Manufacturing & Distribution",
"link": "?industries=Manufacturing & Distribution"
}]
}, {
"download": "",
"id": "2fb15320-0fb0-4035-aa3f-cb056eeef416",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Legal Services",
"title": "Social Engineering: Why Hacking Humans Is Easier Than You Think",
"truncatedTitle": "Social Engineering: Why Hacking Humans ...",
"content": "The term ‘social engineering’ covers a multitude of deceptive attacks, from the all-too familiar phishing, spear phishing and whaling hacks, to less publicized but equally destructive ploys, such as:",
"truncatedContent": "The term ‘social engineering’ covers a multitude of deceptive attacks, from the all-too familiar phishing, spear phishing and whaling hacks, to less ...",
"link": "/longmontco612/Resources/Social-Engineering-Why-Hacking-Humans-Is-Easie-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/114cc2fe-1d5b-4cff-b3c1-366f2e41186d/attachment.aspx",
"postDate": "1/26/2021 2:55:22 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Legal Services",
"link": "?industries=Legal Services"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/How-Supplemental-IT-Services-Make-Your-Business-Mo/CoManagedITInfoSheet_2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "903b8b7f-eb5b-4faf-9bc5-4dcc59a33fae",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Co-managed IT Services",
"industry": "Healthcare",
"title": "How Supplemental IT Services Make Your Business More Competitive",
"truncatedTitle": "How Supplemental IT Services Make Your ...",
"content": "If you employ an in-house IT staff, chances are you stay ahead of the technology curve most of the time. But what about those occasions when you can’t?<img alt=\"itleadership-copy-2.jpg\" src=\"/getattachment/Franchise-Shared-Content/Resources/How-Supplemental-IT-Services-Make-Your-Business-Mo/itleadership-copy-2.jpg.aspx?width=150&height=84\" style=\"width: 150px; height: 84px; float: left;\" title=\"itleadership-copy-2.jpg\" /><br />\r\n ",
"truncatedContent": "If you employ an in-house IT staff, chances are you stay ahead of the technology curve most of the time. But what about those occasions when you can’t?\r\n ",
"link": "/longmontco612/Resources/How-Supplemental-IT-Services-Make-Your-Business-Mo",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/c37f106e-e598-4588-9b7f-f6a0b108f42b/attachment.aspx",
"postDate": "1/21/2021 11:34:00 AM",
"tags": [{
"name": "Co-managed IT Services",
"link": "?topic=Co-managed IT Services"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "",
"id": "c4d24743-964a-44c5-86a2-2219a6049fe7",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Financial & Insurance",
"title": "Countering the 4 Most Likely Cyberattacks",
"truncatedTitle": "Countering the 4 Most Likely Cyberattacks ",
"content": "Your security strategy probably includes taking some measured precautions to safeguard data and repel malicious attacks. Question is, are you fighting the right cyber fight?",
"truncatedContent": "Your security strategy probably includes taking some measured precautions to safeguard data and repel malicious attacks. Question is, are you fighting ...",
"link": "/longmontco612/Resources/Countering-the-4-Most-Likely-Cyberattacks",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/fae57415-b202-4faf-88ce-6817e6ddd135/attachment.aspx",
"postDate": "1/19/2021 2:40:55 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "c4d24743-964a-44c5-86a2-2219a6049fe7",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Financial & Insurance",
"title": "Countering the 4 Most Likely Cyberattacks",
"truncatedTitle": "Countering the 4 Most Likely Cyberattacks ",
"content": "Your security strategy probably includes taking some measured precautions to safeguard data and repel malicious attacks. Question is, are you fighting the right cyber fight?",
"truncatedContent": "Your security strategy probably includes taking some measured precautions to safeguard data and repel malicious attacks. Question is, are you fighting ...",
"link": "/longmontco612/Resources/Countering-the-4-Most-Likely-Cyberattacks-2",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/fae57415-b202-4faf-88ce-6817e6ddd135/attachment.aspx",
"postDate": "1/19/2021 2:40:55 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "c4d24743-964a-44c5-86a2-2219a6049fe7",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Financial & Insurance",
"title": "Countering the 4 Most Likely Cyberattacks",
"truncatedTitle": "Countering the 4 Most Likely Cyberattacks ",
"content": "Your security strategy probably includes taking some measured precautions to safeguard data and repel malicious attacks. Question is, are you fighting the right cyber fight?",
"truncatedContent": "Your security strategy probably includes taking some measured precautions to safeguard data and repel malicious attacks. Question is, are you fighting ...",
"link": "/longmontco612/Resources/Countering-the-4-Most-Likely-Cyberattacks-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/fae57415-b202-4faf-88ce-6817e6ddd135/attachment.aspx",
"postDate": "1/19/2021 2:40:55 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "/TeamlogicIT/media/TLIT-Images/Resources/Info%20Sheets/TLIT-Business-Continuity_2022.pdf?ext=.pdf",
"id": "13634232-7d83-41fa-b0f8-bb58afd9fe3e",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Business Continuity",
"industry": "General-All",
"title": "Business Continuity",
"truncatedTitle": "Business Continuity ",
"content": "<p>You work in a digital world, so when your systems are down, the potential is high for lost productivity, lost customers, and lost revenue. You can minimize this cause and effect outcome with one simple solution—a business continuity plan. </p>\r\n",
"truncatedContent": "You work in a digital world, so when your systems are down, the potential is high for lost productivity, lost customers, and lost revenue. You can minimize ...",
"link": "/longmontco612/Resources/Business-Continuity-2",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "1/8/2021 4:08:52 PM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "67448169-1027-44d5-aee0-109fb35441d0",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Healthcare",
"title": "6 Top Security & Risk Management Trends",
"truncatedTitle": "6 Top Security & Risk Management Trends ",
"content": "Moved by high-profile events, such as the Equifax breach and others, senior executives are acknowledging cybersecurity’s indispensable role in their digital business strategy, and thus, greatly upping support for IT and security teams.",
"truncatedContent": "Moved by high-profile events, such as the Equifax breach and others, senior executives are acknowledging cybersecurity’s indispensable role in their ...",
"link": "/longmontco612/Resources/6-Top-Security-amp;-Risk-Management-Trends",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "n/a",
"image": null,
"postDate": "1/5/2021 12:14:53 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "",
"id": "34191b6a-d5cd-4dda-9a3e-0272b1be7888",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Construction & Contracting",
"title": "Aha Moments: 2020 Cyber Readiness Survey ",
"truncatedTitle": "Aha Moments: 2020 Cyber Readiness Survey ...",
"content": "If you own a small business, a mid-year survey of 400 fellow owners by the Cyber Readiness Institute (CRI) could be one of those good news/bad news scenarios. ",
"truncatedContent": "If you own a small business, a mid-year survey of 400 fellow owners by the Cyber Readiness Institute (CRI) could be one of those good news/bad news scenarios. ",
"link": "/longmontco612/Resources/Aha-Moments-2020-Cyber-Readiness-Survey",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "12/23/2020 4:48:08 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Construction & Contracting",
"link": "?industries=Construction & Contracting"
}]
}, {
"download": "",
"id": "c128f137-fc16-4c9d-903c-c3dbe6251b0c",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Managed Services",
"industry": "Financial & Insurance",
"title": "For 2021, Learn the Language of Uptime ",
"truncatedTitle": "For 2021, Learn the Language of Uptime ...",
"content": "Looking back on 2020, one of the strategic bright spots for business has been the renewed focus on preparing for (and responding to) unexpected events.",
"truncatedContent": "Looking back on 2020, one of the strategic bright spots for business has been the renewed focus on preparing for (and responding to) unexpected events. ",
"link": "/longmontco612/Resources/For-2021-Learn-the-Language-of-Uptime-2",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/1eb7625b-a0fc-4853-b75c-115434b20a8b/attachment.aspx",
"postDate": "12/15/2020 8:53:26 AM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "c128f137-fc16-4c9d-903c-c3dbe6251b0c",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Managed Services",
"industry": "Financial & Insurance",
"title": "For 2021, Learn the Language of Uptime ",
"truncatedTitle": "For 2021, Learn the Language of Uptime ...",
"content": "Looking back on 2020, one of the strategic bright spots for business has been the renewed focus on preparing for (and responding to) unexpected events.",
"truncatedContent": "Looking back on 2020, one of the strategic bright spots for business has been the renewed focus on preparing for (and responding to) unexpected events. ",
"link": "/longmontco612/Resources/For-2021-Learn-the-Language-of-Uptime",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/1eb7625b-a0fc-4853-b75c-115434b20a8b/attachment.aspx",
"postDate": "12/15/2020 8:53:26 AM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "c128f137-fc16-4c9d-903c-c3dbe6251b0c",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Managed Services",
"industry": "Financial & Insurance",
"title": "For 2021, Learn the Language of Uptime ",
"truncatedTitle": "For 2021, Learn the Language of Uptime ...",
"content": "Looking back on 2020, one of the strategic bright spots for business has been the renewed focus on preparing for (and responding to) unexpected events.",
"truncatedContent": "Looking back on 2020, one of the strategic bright spots for business has been the renewed focus on preparing for (and responding to) unexpected events. ",
"link": "/longmontco612/Resources/For-2021-Learn-the-Language-of-Uptime-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/1eb7625b-a0fc-4853-b75c-115434b20a8b/attachment.aspx",
"postDate": "12/15/2020 8:53:26 AM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "da5d7530-9311-4cb4-a41c-d1a0803323fc",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Data/Voice/Connectivity",
"industry": "Accounting",
"title": "3 Ways VoIP Can Benefit Your Business",
"truncatedTitle": "3 Ways VoIP Can Benefit Your Business ",
"content": "Today’s VoIP solutions, especially when delivered over a secure private network, offer myriad features that help smaller businesses affordably level the playing field.",
"truncatedContent": "Today’s VoIP solutions, especially when delivered over a secure private network, offer myriad features that help smaller businesses affordably level ...",
"link": "/longmontco612/Resources/3-Ways-VoIP-Can-Benefit-Your-Business",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/457dac6a-e7ae-4886-8dec-68c2128d6304/attachment.aspx",
"postDate": "12/8/2020 4:09:53 PM",
"tags": [{
"name": "Data/Voice/Connectivity",
"link": "?topic=Data/Voice/Connectivity"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "",
"id": "da5d7530-9311-4cb4-a41c-d1a0803323fc",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Data/Voice/Connectivity",
"industry": "Accounting",
"title": "3 Ways VoIP Can Benefit Your Business",
"truncatedTitle": "3 Ways VoIP Can Benefit Your Business ",
"content": "Today’s VoIP solutions, especially when delivered over a secure private network, offer myriad features that help smaller businesses affordably level the playing field.",
"truncatedContent": "Today’s VoIP solutions, especially when delivered over a secure private network, offer myriad features that help smaller businesses affordably level ...",
"link": "/longmontco612/Resources/3-Ways-VoIP-Can-Benefit-Your-Business-2",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/457dac6a-e7ae-4886-8dec-68c2128d6304/attachment.aspx",
"postDate": "12/8/2020 4:09:53 PM",
"tags": [{
"name": "Data/Voice/Connectivity",
"link": "?topic=Data/Voice/Connectivity"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "",
"id": "da5d7530-9311-4cb4-a41c-d1a0803323fc",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Data/Voice/Connectivity",
"industry": "Accounting",
"title": "3 Ways VoIP Can Benefit Your Business",
"truncatedTitle": "3 Ways VoIP Can Benefit Your Business ",
"content": "Today’s VoIP solutions, especially when delivered over a secure private network, offer myriad features that help smaller businesses affordably level the playing field.",
"truncatedContent": "Today’s VoIP solutions, especially when delivered over a secure private network, offer myriad features that help smaller businesses affordably level ...",
"link": "/longmontco612/Resources/3-Ways-VoIP-Can-Benefit-Your-Business-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/457dac6a-e7ae-4886-8dec-68c2128d6304/attachment.aspx",
"postDate": "12/8/2020 4:09:53 PM",
"tags": [{
"name": "Data/Voice/Connectivity",
"link": "?topic=Data/Voice/Connectivity"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "",
"id": "9770f304-b188-4118-b647-1142a9491848",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Accounting",
"title": "“Flight Risk” Insiders Fuel Data Theft ",
"truncatedTitle": "“Flight Risk” Insiders Fuel Data Theft ...",
"content": "A 2020 insider threat report covered earlier this year by Infosec.com and others validates such worries, tying 60% of all insider cybersecurity incidents and data loss to so-called “flight risk” employees and contractors–those who are most likely to soon leave their positions within a company.",
"truncatedContent": "A 2020 insider threat report covered earlier this year by Infosec.com and others validates such worries, tying 60% of all insider cybersecurity incidents ...",
"link": "/longmontco612/Resources/Flight-Risk-Insiders-Fuel-Data-Theft",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/93932014-94a6-4df9-9f18-5a58d8c3b77f/attachment.aspx",
"postDate": "12/1/2020 4:29:36 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "",
"id": "9770f304-b188-4118-b647-1142a9491848",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Accounting",
"title": "“Flight Risk” Insiders Fuel Data Theft ",
"truncatedTitle": "“Flight Risk” Insiders Fuel Data Theft ...",
"content": "A 2020 insider threat report covered earlier this year by Infosec.com and others validates such worries, tying 60% of all insider cybersecurity incidents and data loss to so-called “flight risk” employees and contractors–those who are most likely to soon leave their positions within a company.",
"truncatedContent": "A 2020 insider threat report covered earlier this year by Infosec.com and others validates such worries, tying 60% of all insider cybersecurity incidents ...",
"link": "/longmontco612/Resources/Flight-Risk-Insiders-Fuel-Data-Theft-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/93932014-94a6-4df9-9f18-5a58d8c3b77f/attachment.aspx",
"postDate": "12/1/2020 4:29:36 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "",
"id": "9770f304-b188-4118-b647-1142a9491848",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Accounting",
"title": "“Flight Risk” Insiders Fuel Data Theft ",
"truncatedTitle": "“Flight Risk” Insiders Fuel Data Theft ...",
"content": "A 2020 insider threat report covered earlier this year by Infosec.com and others validates such worries, tying 60% of all insider cybersecurity incidents and data loss to so-called “flight risk” employees and contractors–those who are most likely to soon leave their positions within a company.",
"truncatedContent": "A 2020 insider threat report covered earlier this year by Infosec.com and others validates such worries, tying 60% of all insider cybersecurity incidents ...",
"link": "/longmontco612/Resources/Flight-Risk-Insiders-Fuel-Data-Theft-2",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/93932014-94a6-4df9-9f18-5a58d8c3b77f/attachment.aspx",
"postDate": "12/1/2020 4:29:36 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "",
"id": "5bafa935-31f0-4987-bf0c-41ec7bd86982",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Construction & Contracting",
"title": "Case for MFA Grows Stronger in 2020 ",
"truncatedTitle": "Case for MFA Grows Stronger in 2020 ...",
"content": "With phishing attacks accelerating and related fraud-losses approaching $4 billion, the case for using multi-factor authentication (MFA) to protect businesses against ambitious hackers has arguably never been stronger.",
"truncatedContent": "With phishing attacks accelerating and related fraud-losses approaching $4 billion, the case for using multi-factor authentication (MFA) to protect businesses ...",
"link": "/longmontco612/Resources/Case-for-MFA-Grows-Stronger-in-2020-2",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/81775a92-4166-4684-ad2d-f538e1157a2d/attachment.aspx",
"postDate": "11/24/2020 3:30:44 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Construction & Contracting",
"link": "?industries=Construction & Contracting"
}]
}, {
"download": "",
"id": "5bafa935-31f0-4987-bf0c-41ec7bd86982",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Construction & Contracting",
"title": "Case for MFA Grows Stronger in 2020 ",
"truncatedTitle": "Case for MFA Grows Stronger in 2020 ...",
"content": "With phishing attacks accelerating and related fraud-losses approaching $4 billion, the case for using multi-factor authentication (MFA) to protect businesses against ambitious hackers has arguably never been stronger.",
"truncatedContent": "With phishing attacks accelerating and related fraud-losses approaching $4 billion, the case for using multi-factor authentication (MFA) to protect businesses ...",
"link": "/longmontco612/Resources/Case-for-MFA-Grows-Stronger-in-2020",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/81775a92-4166-4684-ad2d-f538e1157a2d/attachment.aspx",
"postDate": "11/24/2020 3:30:44 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Construction & Contracting",
"link": "?industries=Construction & Contracting"
}]
}, {
"download": "",
"id": "5bafa935-31f0-4987-bf0c-41ec7bd86982",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Construction & Contracting",
"title": "Case for MFA Grows Stronger in 2020 ",
"truncatedTitle": "Case for MFA Grows Stronger in 2020 ...",
"content": "With phishing attacks accelerating and related fraud-losses approaching $4 billion, the case for using multi-factor authentication (MFA) to protect businesses against ambitious hackers has arguably never been stronger.",
"truncatedContent": "With phishing attacks accelerating and related fraud-losses approaching $4 billion, the case for using multi-factor authentication (MFA) to protect businesses ...",
"link": "/longmontco612/Resources/Case-for-MFA-Grows-Stronger-in-2020-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/81775a92-4166-4684-ad2d-f538e1157a2d/attachment.aspx",
"postDate": "11/24/2020 3:30:44 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Construction & Contracting",
"link": "?industries=Construction & Contracting"
}]
}, {
"download": "",
"id": "3be93363-ecd1-4d91-b8d7-8c5ff273f176",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cloud Computing",
"industry": "Financial & Insurance",
"title": "Business Beware–Cloud Migration Missteps ",
"truncatedTitle": "Business Beware–Cloud Migration Missteps ...",
"content": "Thinking about migrating some (or some more) of your business to the cloud? You’re not alone. By some estimates, as many as 80% of companies today rely on cloud services for vital functions such as data backup, remote offices, media storage and more.",
"truncatedContent": "Thinking about migrating some (or some more) of your business to the cloud? You’re not alone. By some estimates, as many as 80% of companies today rely ...",
"link": "/longmontco612/Resources/Business-Beware-Cloud-Migration-Missteps",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/620e665e-b44b-43c3-8ebe-6e258d8436b0/attachment.aspx",
"postDate": "11/17/2020 5:10:20 PM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "3be93363-ecd1-4d91-b8d7-8c5ff273f176",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cloud Computing",
"industry": "Financial & Insurance",
"title": "Business Beware–Cloud Migration Missteps ",
"truncatedTitle": "Business Beware–Cloud Migration Missteps ...",
"content": "Thinking about migrating some (or some more) of your business to the cloud? You’re not alone. By some estimates, as many as 80% of companies today rely on cloud services for vital functions such as data backup, remote offices, media storage and more.",
"truncatedContent": "Thinking about migrating some (or some more) of your business to the cloud? You’re not alone. By some estimates, as many as 80% of companies today rely ...",
"link": "/longmontco612/Resources/Business-Beware-Cloud-Migration-Missteps-2",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/620e665e-b44b-43c3-8ebe-6e258d8436b0/attachment.aspx",
"postDate": "11/17/2020 5:10:20 PM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "3be93363-ecd1-4d91-b8d7-8c5ff273f176",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cloud Computing",
"industry": "Financial & Insurance",
"title": "Business Beware–Cloud Migration Missteps ",
"truncatedTitle": "Business Beware–Cloud Migration Missteps ...",
"content": "Thinking about migrating some (or some more) of your business to the cloud? You’re not alone. By some estimates, as many as 80% of companies today rely on cloud services for vital functions such as data backup, remote offices, media storage and more.",
"truncatedContent": "Thinking about migrating some (or some more) of your business to the cloud? You’re not alone. By some estimates, as many as 80% of companies today rely ...",
"link": "/longmontco612/Resources/Business-Beware-Cloud-Migration-Missteps-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/620e665e-b44b-43c3-8ebe-6e258d8436b0/attachment.aspx",
"postDate": "11/17/2020 5:10:20 PM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "21ff7a06-14bd-4da5-b488-69afc688feaf",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Managed Services",
"industry": "Financial & Insurance",
"title": "4 Reasons to Upgrade Risky, Outdated IT",
"truncatedTitle": "4 Reasons to Upgrade Risky, Outdated IT ",
"content": "For many business leaders, the sudden transition to a distributed workforce–and all the supplementary challenges that accompanied it–at least highlighted gaps and opportunities in existing IT infrastructure.",
"truncatedContent": "For many business leaders, the sudden transition to a distributed workforce–and all the supplementary challenges that accompanied it–at least highlighted ...",
"link": "/longmontco612/Resources/4-Reasons-to-Upgrade-Risky-Outdated-IT",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/5bf9cb5c-66ee-4354-81fe-36a49aadac1d/attachment.aspx",
"postDate": "11/10/2020 3:20:54 PM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "21ff7a06-14bd-4da5-b488-69afc688feaf",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Managed Services",
"industry": "Financial & Insurance",
"title": "4 Reasons to Upgrade Risky, Outdated IT",
"truncatedTitle": "4 Reasons to Upgrade Risky, Outdated IT ",
"content": "For many business leaders, the sudden transition to a distributed workforce–and all the supplementary challenges that accompanied it–at least highlighted gaps and opportunities in existing IT infrastructure.",
"truncatedContent": "For many business leaders, the sudden transition to a distributed workforce–and all the supplementary challenges that accompanied it–at least highlighted ...",
"link": "/longmontco612/Resources/4-Reasons-to-Upgrade-Risky-Outdated-IT-2",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/5bf9cb5c-66ee-4354-81fe-36a49aadac1d/attachment.aspx",
"postDate": "11/10/2020 3:20:54 PM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "21ff7a06-14bd-4da5-b488-69afc688feaf",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Managed Services",
"industry": "Financial & Insurance",
"title": "4 Reasons to Upgrade Risky, Outdated IT",
"truncatedTitle": "4 Reasons to Upgrade Risky, Outdated IT ",
"content": "For many business leaders, the sudden transition to a distributed workforce–and all the supplementary challenges that accompanied it–at least highlighted gaps and opportunities in existing IT infrastructure.",
"truncatedContent": "For many business leaders, the sudden transition to a distributed workforce–and all the supplementary challenges that accompanied it–at least highlighted ...",
"link": "/longmontco612/Resources/4-Reasons-to-Upgrade-Risky-Outdated-IT-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/5bf9cb5c-66ee-4354-81fe-36a49aadac1d/attachment.aspx",
"postDate": "11/10/2020 3:20:54 PM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "28ab7ed5-4714-483e-8506-68bef6f8ab4c",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Trends",
"industry": "Healthcare",
"title": "Verizon Study Highlights Security Trends ",
"truncatedTitle": "Verizon Study Highlights Security Trends ...",
"content": "Each year, security experts like TeamLogic IT and others relish in previewing results from Verizon’s highly anticipated Data Breach Investigations Report (VDBIR). One reason is that the in-depth research reveals existing cybersecurity gaps, where such holes occur, who’s sneaking in and why.",
"truncatedContent": "Each year, security experts like TeamLogic IT and others relish in previewing results from Verizon’s highly anticipated Data Breach Investigations Report ...",
"link": "/longmontco612/Resources/Verizon-Study-Highlights-Security-Trends-2",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/449581ea-81e4-440c-8fca-7c850ace0dd7/attachment.aspx",
"postDate": "11/3/2020 3:09:55 PM",
"tags": [{
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "",
"id": "28ab7ed5-4714-483e-8506-68bef6f8ab4c",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Trends",
"industry": "Healthcare",
"title": "Verizon Study Highlights Security Trends ",
"truncatedTitle": "Verizon Study Highlights Security Trends ...",
"content": "Each year, security experts like TeamLogic IT and others relish in previewing results from Verizon’s highly anticipated Data Breach Investigations Report (VDBIR). One reason is that the in-depth research reveals existing cybersecurity gaps, where such holes occur, who’s sneaking in and why.",
"truncatedContent": "Each year, security experts like TeamLogic IT and others relish in previewing results from Verizon’s highly anticipated Data Breach Investigations Report ...",
"link": "/longmontco612/Resources/Verizon-Study-Highlights-Security-Trends-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/449581ea-81e4-440c-8fca-7c850ace0dd7/attachment.aspx",
"postDate": "11/3/2020 3:09:55 PM",
"tags": [{
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "",
"id": "28ab7ed5-4714-483e-8506-68bef6f8ab4c",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Trends",
"industry": "Healthcare",
"title": "Verizon Study Highlights Security Trends ",
"truncatedTitle": "Verizon Study Highlights Security Trends ...",
"content": "Each year, security experts like TeamLogic IT and others relish in previewing results from Verizon’s highly anticipated Data Breach Investigations Report (VDBIR). One reason is that the in-depth research reveals existing cybersecurity gaps, where such holes occur, who’s sneaking in and why.",
"truncatedContent": "Each year, security experts like TeamLogic IT and others relish in previewing results from Verizon’s highly anticipated Data Breach Investigations Report ...",
"link": "/longmontco612/Resources/Verizon-Study-Highlights-Security-Trends",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/449581ea-81e4-440c-8fca-7c850ace0dd7/attachment.aspx",
"postDate": "11/3/2020 3:09:55 PM",
"tags": [{
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "",
"id": "02fefba8-431c-44c5-a859-2551d17302d9",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Manufacturing & Distribution",
"title": "Road Warriors’ IT Security Refresher ",
"truncatedTitle": "Road Warriors’ IT Security Refresher ",
"content": "Always be aware of your physical surroundings in any public setting. Though many things have changed since the advent of COVID, the motivations of people wanting to steal mobile devices and sensitive data certainly have not.",
"truncatedContent": "Always be aware of your physical surroundings in any public setting. Though many things have changed since the advent of COVID, the motivations of people ...",
"link": "/longmontco612/Resources/Road-Warriors-IT-Security-Refresher-2",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/a0bbb3fd-6c69-4267-8813-045f5bce15ab/attachment.aspx",
"postDate": "10/27/2020 2:43:43 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Manufacturing & Distribution",
"link": "?industries=Manufacturing & Distribution"
}]
}, {
"download": "",
"id": "02fefba8-431c-44c5-a859-2551d17302d9",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Manufacturing & Distribution",
"title": "Road Warriors’ IT Security Refresher ",
"truncatedTitle": "Road Warriors’ IT Security Refresher ",
"content": "Always be aware of your physical surroundings in any public setting. Though many things have changed since the advent of COVID, the motivations of people wanting to steal mobile devices and sensitive data certainly have not.",
"truncatedContent": "Always be aware of your physical surroundings in any public setting. Though many things have changed since the advent of COVID, the motivations of people ...",
"link": "/longmontco612/Resources/Road-Warriors-IT-Security-Refresher-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/a0bbb3fd-6c69-4267-8813-045f5bce15ab/attachment.aspx",
"postDate": "10/27/2020 2:43:43 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Manufacturing & Distribution",
"link": "?industries=Manufacturing & Distribution"
}]
}, {
"download": "",
"id": "d4aebe9d-c4fa-4c98-978a-39c3677ef26c",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cloud Computing",
"industry": "Accounting",
"title": "Align Cloud Adoption to Business Goals",
"truncatedTitle": "Align Cloud Adoption to Business Goals ",
"content": "Migrating business functionality and workflows to the cloud is a strategy that’s been examined and reexamined for some time now.",
"truncatedContent": "Migrating business functionality and workflows to the cloud is a strategy that’s been examined and reexamined for some time now. ",
"link": "/longmontco612/Resources/Align-Cloud-Adoption-to-Business-Goals-2",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/f438fc35-dc4d-4488-b8ff-fa72b32b4b81/attachment.aspx",
"postDate": "10/20/2020 4:11:40 PM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "",
"id": "d4aebe9d-c4fa-4c98-978a-39c3677ef26c",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cloud Computing",
"industry": "Accounting",
"title": "Align Cloud Adoption to Business Goals",
"truncatedTitle": "Align Cloud Adoption to Business Goals ",
"content": "Migrating business functionality and workflows to the cloud is a strategy that’s been examined and reexamined for some time now.",
"truncatedContent": "Migrating business functionality and workflows to the cloud is a strategy that’s been examined and reexamined for some time now. ",
"link": "/longmontco612/Resources/Align-Cloud-Adoption-to-Business-Goals",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/f438fc35-dc4d-4488-b8ff-fa72b32b4b81/attachment.aspx",
"postDate": "10/20/2020 4:11:40 PM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "",
"id": "d4aebe9d-c4fa-4c98-978a-39c3677ef26c",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cloud Computing",
"industry": "Accounting",
"title": "Align Cloud Adoption to Business Goals",
"truncatedTitle": "Align Cloud Adoption to Business Goals ",
"content": "Migrating business functionality and workflows to the cloud is a strategy that’s been examined and reexamined for some time now.",
"truncatedContent": "Migrating business functionality and workflows to the cloud is a strategy that’s been examined and reexamined for some time now. ",
"link": "/longmontco612/Resources/Align-Cloud-Adoption-to-Business-Goals-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/f438fc35-dc4d-4488-b8ff-fa72b32b4b81/attachment.aspx",
"postDate": "10/20/2020 4:11:40 PM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "",
"id": "cecfc211-9c0f-467e-967b-10e65470ddba",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Healthcare",
"title": "Happy Cybersecurity Awareness Month",
"truncatedTitle": "Happy Cybersecurity Awareness Month ",
"content": "The official designation of Cybersecurity Awareness Month comes from the National Cybersecurity Alliance (NCSA), a public/private sector coalition dedicated to keeping individuals and organizations safer and more secure online.",
"truncatedContent": "The official designation of Cybersecurity Awareness Month comes from the National Cybersecurity Alliance (NCSA), a public/private sector coalition dedicated ...",
"link": "/longmontco612/Resources/Happy-Cybersecurity-Awareness-Month-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/e8dc4b8a-ff58-4392-a914-4c4da37b0220/attachment.aspx",
"postDate": "10/13/2020 3:23:40 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "",
"id": "cecfc211-9c0f-467e-967b-10e65470ddba",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Healthcare",
"title": "Happy Cybersecurity Awareness Month",
"truncatedTitle": "Happy Cybersecurity Awareness Month ",
"content": "The official designation of Cybersecurity Awareness Month comes from the National Cybersecurity Alliance (NCSA), a public/private sector coalition dedicated to keeping individuals and organizations safer and more secure online.",
"truncatedContent": "The official designation of Cybersecurity Awareness Month comes from the National Cybersecurity Alliance (NCSA), a public/private sector coalition dedicated ...",
"link": "/longmontco612/Resources/Happy-Cybersecurity-Awareness-Month",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/e8dc4b8a-ff58-4392-a914-4c4da37b0220/attachment.aspx",
"postDate": "10/13/2020 3:23:40 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "",
"id": "cecfc211-9c0f-467e-967b-10e65470ddba",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Healthcare",
"title": "Happy Cybersecurity Awareness Month",
"truncatedTitle": "Happy Cybersecurity Awareness Month ",
"content": "The official designation of Cybersecurity Awareness Month comes from the National Cybersecurity Alliance (NCSA), a public/private sector coalition dedicated to keeping individuals and organizations safer and more secure online.",
"truncatedContent": "The official designation of Cybersecurity Awareness Month comes from the National Cybersecurity Alliance (NCSA), a public/private sector coalition dedicated ...",
"link": "/longmontco612/Resources/Happy-Cybersecurity-Awareness-Month-2",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/e8dc4b8a-ff58-4392-a914-4c4da37b0220/attachment.aspx",
"postDate": "10/13/2020 3:23:40 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "",
"id": "3453b267-0662-440b-a082-f9069016a6ac",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Financial & Insurance",
"title": "3 Top Phishing Scams and How to Catch Them",
"truncatedTitle": "3 Top Phishing Scams and How to Catch Them ",
"content": "In recent years, U.S. businesses have lost more than $12.5 billion to BEC scams, according to the FBI. One effective measure against this attack is instating a policy of ‘channel switching’ for requests of a certain type or dollar amount. For example, if a request is made over email, the response is sent via messaging app.",
"truncatedContent": "In recent years, U.S. businesses have lost more than $12.5 billion to BEC scams, according to the FBI. One effective measure against this attack is instating ...",
"link": "/longmontco612/Resources/3-Top-Phishing-Scams-and-How-to-Catch-Them",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/e591c241-3ffa-4da7-8519-15dc9f64a371/attachment.aspx",
"postDate": "9/29/2020 3:35:26 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "d972ad1d-a93d-43f9-8ff6-9001720f7b0e",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Trends",
"industry": "Education",
"title": "Want to be a Digital Innovator? Here are 3 Critical Traits You ",
"truncatedTitle": "Want to be a Digital Innovator? Here are ...",
"content": "Today’s business landscape is shaped by technology. Leaders of organizations of any size and shape must navigate terrain that rises and falls on mega trends such as mobility, cloud services and big data. The journey can be especially rigorous for executives leading small to mid-size businesses. ",
"truncatedContent": "Today’s business landscape is shaped by technology. Leaders of organizations of any size and shape must navigate terrain that rises and falls on mega ...",
"link": "/longmontco612/Resources/Want-to-be-a-Digital-Innovator-Here-are-3-Crit-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/8ae6d43e-594d-4827-b4ca-abf51afe334a/attachment.aspx",
"postDate": "9/22/2020 4:12:58 PM",
"tags": [{
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "Education",
"link": "?industries=Education"
}]
}, {
"download": "",
"id": "ece246f1-f097-44a6-b6b7-b6de5c8e083b",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Financial & Insurance",
"title": "4 Ways to Bolster Data-Privacy Compliance",
"truncatedTitle": "4 Ways to Bolster Data-Privacy Compliance ",
"content": "With businesses trying to move beyond the COVID pandemic, it would be easy to forget that privacy and security laws, like the GDPR and California Consumer Protection Act (CCPA), are <em>still</em> <em>very much in effect</em>.",
"truncatedContent": "With businesses trying to move beyond the COVID pandemic, it would be easy to forget that privacy and security laws, like the GDPR and California Consumer ...",
"link": "/longmontco612/Resources/4-Ways-to-Bolster-Data-Privacy-Compliance",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/01fd26f1-4630-446e-ac9e-15d3056f627b/attachment.aspx",
"postDate": "9/8/2020 3:36:30 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "1fef7785-8abf-4442-983c-462ec5886e2d",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Financial & Insurance",
"title": "5 Essential Patch-Management Pointers",
"truncatedTitle": "5 Essential Patch-Management Pointers ",
"content": "Regular patch management is one of the easiest and most effective methods of securing your company’s infrastructure. However, in the bustle of a smaller company, the precaution can easily take a backseat to other activities, quietly increasing vulnerability to malicious cyberattacks.",
"truncatedContent": "Regular patch management is one of the easiest and most effective methods of securing your company’s infrastructure. However, in the bustle of a smaller ...",
"link": "/longmontco612/Resources/5-Essential-Patch-Management-Pointers",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/ee3743a2-a84e-4802-bc49-a11d08923665/attachment.aspx",
"postDate": "9/2/2020 6:10:55 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "/getattachment/ddefa702-7745-4901-a82e-625357e5a591/LogicalAdvantage_Sep2020.pdf.aspx?lang=en-US&ext=.pdf",
"id": "05d70eb2-ab4a-4388-b5e8-04f4a63f95fd",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Trends",
"industry": "Healthcare",
"title": "Tech-Spend Trends in the Era of COVID",
"truncatedTitle": "Tech-Spend Trends in the Era of COVID ",
"content": "As late as January of this year, market intelligence consultancy, IDC, predicted a 5.1% jump in worldwide technology spending, year-over-year.",
"truncatedContent": "As late as January of this year, market intelligence consultancy, IDC, predicted a 5.1% jump in worldwide technology spending, year-over-year. ",
"link": "/longmontco612/Resources/Tech-Spend-Trends-in-the-Era-of-COVID-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "8/31/2020 3:35:50 PM",
"tags": [{
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "/TeamlogicIT/media/TLIT-Images/Resources/Info%20Sheets/TLIT-Cybersecurity-Info-Sheet_2022.pdf?ext=.pdf",
"id": "bb4a464c-deaa-4063-930f-fa93cc5a5292",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Cybersecurity",
"industry": "Healthcare|Accounting",
"title": "Cybersecurity Services",
"truncatedTitle": "Cybersecurity Services ",
"content": "<p>Security threats are growing more aggressive every day and cyber criminals are getting smarter. The cost of disruption caused by breaches and the general loss of important data can cripple a business. </p>\r\n",
"truncatedContent": "Security threats are growing more aggressive every day and cyber criminals are getting smarter. The cost of disruption caused by breaches and the general ...",
"link": "/longmontco612/Resources/Data-and-Business-Protection",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "8/28/2020 4:47:18 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "/TeamlogicIT/media/TLIT-Images/Resources/Info%20Sheets/TLIT-Cloud-Services-Info-Sheet_2022.pdf?ext=.pdf",
"id": "ced1fbc5-08d7-41e8-bb77-4b5ea99cb909",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Cloud Computing",
"industry": "Accounting",
"title": "Cloud Services",
"truncatedTitle": "Cloud Services ",
"content": "<p>Over the last few years more businesses have turned to the cloud to future proof their business. Cloud services allow you to work anytime, anywhere, across multiple devices. </p>\r\n",
"truncatedContent": "Over the last few years more businesses have turned to the cloud to future proof their business. Cloud services allow you to work anytime, anywhere, ...",
"link": "/longmontco612/Resources/Lift-Your-Business-to-the-cloud",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "8/28/2020 4:42:47 PM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/Improve-Productivity/ComputerMaintenanceInfoSheet_2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "4deda3cd-b031-41ed-b013-f6e05a9b3b5c",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Managed Services",
"industry": "Accounting|General-All",
"title": "Computer Maintenance",
"truncatedTitle": "Computer Maintenance ",
"content": "<p>Computer maintenance services are vital for good business health, so it’s important to put the care of your computer equipment and IT system into the hands of someone you trust.</p>\r\n",
"truncatedContent": "Computer maintenance services are vital for good business health, so it’s important to put the care of your computer equipment and IT system into the ...",
"link": "/longmontco612/Resources/Improve-Productivity",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "8/28/2020 4:41:31 PM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/Position-Your-Business-for-Success/ITServicesInfoSheet_2021.pdf.aspx?lang=en-US&ext=.pdf",
"id": "7a6c2a41-7a59-498b-a745-359161b4e920",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Managed Services",
"industry": "General-All",
"title": "Position Your Business for Success",
"truncatedTitle": "Position Your Business for Success ",
"content": "<p><b>Need help with your technology? </b>Whether you need immediate help with your computer systems or are looking for managed IT services to keep your technology up and running, we can get it done. </p>\r\n",
"truncatedContent": "Need help with your technology? Whether you need immediate help with your computer systems or are looking for managed IT services to keep your technology ...",
"link": "/longmontco612/Resources/Position-Your-Business-for-Success",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "8/28/2020 4:12:34 PM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "9487e959-d5fd-49a0-953a-4a786376d196",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cloud Computing",
"industry": "Accounting",
"title": "3 Telling Trends in Cloud-Tech Adoption",
"truncatedTitle": "3 Telling Trends in Cloud-Tech Adoption ",
"content": "The adoption of cloud-based solutions is on the rise, as businesses of all sizes, in countries around the world, seek to reduce costs, streamline operations and gain competitive advantage.",
"truncatedContent": "The adoption of cloud-based solutions is on the rise, as businesses of all sizes, in countries around the world, seek to reduce costs, streamline operations ...",
"link": "/longmontco612/Resources/3-Telling-Trends-in-Cloud-Tech-Adoption",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "8/11/2020 4:02:20 PM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "",
"id": "5ecd3bdc-def0-48a5-b4f6-93909b30da16",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Non-Profit",
"title": "4 Ways to Sustain Remote Cyber-Hygiene",
"truncatedTitle": "4 Ways to Sustain Remote Cyber-Hygiene ",
"content": "As businesses start to rebound from the COVID-19 pandemic, many will retain some portion of their at-home workforce. For enterprises large or small, here are some suggestions that can help you sustain telework security as time goes on. ",
"truncatedContent": "As businesses start to rebound from the COVID-19 pandemic, many will retain some portion of their at-home workforce. For enterprises large or small, ...",
"link": "/longmontco612/Resources/4-Ways-to-Sustain-Remote-Cyber-Hygiene",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/5839d516-2e45-4f73-8fe3-f4475c977c9a/attachment.aspx",
"postDate": "8/11/2020 3:09:40 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Non-Profit",
"link": "?industries=Non-Profit"
}]
}, {
"download": "",
"id": "6eb1f0cf-716a-4167-971c-f564c9ee5369",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Education",
"title": "3 Steps to Better Backup Planning",
"truncatedTitle": "3 Steps to Better Backup Planning ",
"content": "As smaller firms seek to regain their footing, business leaders are again able to devote time to reviewing and improving data-backup procedures–a critical risk-management strategy carrying even greater significance in a post-COVID world.<br />\r\n ",
"truncatedContent": "As smaller firms seek to regain their footing, business leaders are again able to devote time to reviewing and improving data-backup procedures–a critical ...",
"link": "/longmontco612/Resources/3-Steps-to-Better-Backup-Planning",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/4bf29cc9-e324-4d62-bd73-09a802036867/attachment.aspx",
"postDate": "8/5/2020 6:16:19 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Education",
"link": "?industries=Education"
}]
}, {
"download": "/getattachment/add888fc-ee7a-4e64-bfd4-a989379951ba/LogicalAdvantage_Aug2020.pdf.aspx?lang=en-US&ext=.pdf",
"id": "ac346823-cb6b-44cc-b41f-7c6d5c714b9f",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Trends",
"industry": "Healthcare",
"title": "NIST Drafts New Security Frameworks",
"truncatedTitle": "NIST Drafts New Security Frameworks ",
"content": "Throughout 2020, the National Institute for Standards and Technology (NIST), is expected to release several updated security and risk management frameworks with expert guidance that can be selectively integrated into enterprises large and small.",
"truncatedContent": "Throughout 2020, the National Institute for Standards and Technology (NIST), is expected to release several updated security and risk management frameworks ...",
"link": "/longmontco612/Resources/NIST-Drafts-New-Security-Frameworks-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "8/4/2020 5:02:30 PM",
"tags": [{
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "/getattachment/9695cfdb-8d58-416c-88b1-d30f22535a40/LogicalAdvantage_July2020.pdf.aspx?lang=en-US&ext=.pdf",
"id": "dfe903e8-7abf-4c5a-bb6c-5671a8403edd",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Newsletters",
"topic": "Trends",
"industry": "Healthcare|Legal Services|Financial & Insurance|Manufacturing & Distribution|Construction & Contracting|Non-Profit|Education|Accounting",
"title": "Four Ways to Safeguard Company Video Calls",
"truncatedTitle": "Four Ways to Safeguard Company Video Calls ",
"content": "Criminal eavesdropping and hijacking of video teleconferencing calls got so bad earlier this year that the FBI issued advisories to protect organizations of all kinds against them.",
"truncatedContent": "Criminal eavesdropping and hijacking of video teleconferencing calls got so bad earlier this year that the FBI issued advisories to protect organizations ...",
"link": "/longmontco612/Resources/Four-Ways-to-Safeguard-Company-Video-Calls",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "8/4/2020 4:52:17 PM",
"tags": [{
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}, {
"name": "Legal Services",
"link": "?industries=Legal Services"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}, {
"name": "Manufacturing & Distribution",
"link": "?industries=Manufacturing & Distribution"
}, {
"name": "Construction & Contracting",
"link": "?industries=Construction & Contracting"
}, {
"name": "Non-Profit",
"link": "?industries=Non-Profit"
}, {
"name": "Education",
"link": "?industries=Education"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "",
"id": "4a17cec1-19e6-4e29-8a0d-5f95f0a72d43",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Remote workforce",
"industry": "Education",
"title": "Tips for Preventing Remote-Team Burnout",
"truncatedTitle": "Tips for Preventing Remote-Team Burnout ",
"content": "The sudden shift to a telework model, followed by months of sustained uncertainty hasn't been easy for anyone, least of all on those who never expected or wanted to work exclusively from home.",
"truncatedContent": "The sudden shift to a telework model, followed by months of sustained uncertainty hasn't been easy for anyone, least of all on those who never expected ...",
"link": "/longmontco612/Resources/Tips-for-Preventing-Remote-Team-Burnout",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/0c6686de-9c22-4b4a-a379-2e2f9393dfdf/attachment.aspx",
"postDate": "7/21/2020 3:42:53 PM",
"tags": [{
"name": "Remote workforce",
"link": "?topic=Remote workforce"
}, {
"name": "Education",
"link": "?industries=Education"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/How-an-IT-Treatment-Is-Helping-in-the-Fight-Agains/Biotech_CaseStudy_2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "5539d802-18f6-4852-a574-8dafb4449f76",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Cybersecurity",
"industry": "Healthcare",
"title": "How an IT Treatment Is Helping in the Fight Against COVID-19",
"truncatedTitle": "How an IT Treatment Is Helping in the Fight ...",
"content": "<p>During the COVID-19 crisis that brought the world to a crashing halt in 2020, a biotechnology company started the arduous process of developing a vaccine for the dreadful virus. </p>\r\n",
"truncatedContent": "During the COVID-19 crisis that brought the world to a crashing halt in 2020, a biotechnology company started the arduous process of developing a vaccine ...",
"link": "/longmontco612/Resources/How-an-IT-Treatment-Is-Helping-in-the-Fight-Agains",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "7/16/2020 3:20:17 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "",
"id": "4418e5cf-5e7e-4c0c-84ea-e56c2f85dbb1",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Accounting|General-All",
"title": "Stalled: Windows 7-to-Windows 10 Upgrades ",
"truncatedTitle": "Stalled: Windows 7-to-Windows 10 Upgrades ...",
"content": "ComputerWorld.com reports that companies’ pre-COVID push to upgrade old (and now-dangerously insecure) Windows 7 PCs to the next-generation Windows 10 OS has temporarily stalled.",
"truncatedContent": "ComputerWorld.com reports that companies’ pre-COVID push to upgrade old (and now-dangerously insecure) Windows 7 PCs to the next-generation Windows 10 ...",
"link": "/longmontco612/Resources/Stalled-Windows-7-to-Windows-10-Upgrades",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/9e9c7f81-b03d-497d-9443-2ca7b1846cd1/attachment.aspx",
"postDate": "7/15/2020 3:44:48 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/c114806b-53cd-4bcb-9a8f-4bda28c3fa43/TruckPermitting_0520_webformat.pdf.aspx?lang=en-US&ext=.pdf",
"id": "994fc0bd-51f7-4a29-8e6d-7f4b258b0b9d",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Business Continuity|Managed Services",
"industry": "Construction & Contracting",
"title": "Unraveling a Permitting Company's IT Nightmare",
"truncatedTitle": "Unraveling a Permitting Company's IT Nightmare ",
"content": "<p>The owners of a permitting company count their many blessings as they recall how their business persevered through a tortuous year of IT disasters. </p>\r\n",
"truncatedContent": "The owners of a permitting company count their many blessings as they recall how their business persevered through a tortuous year of IT disasters. \r\n ",
"link": "/longmontco612/Resources/Unraveling-a-Permitting-Company-s-IT-Nightmare",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/a4bc1f5d-c21e-4f16-9929-ee91697ee770/attachment.aspx",
"postDate": "6/29/2020 2:16:43 PM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Construction & Contracting",
"link": "?industries=Construction & Contracting"
}]
}, {
"download": "/TeamlogicIT/media/TLIT-Images/Resources/Case%20Studies/SportsEquipment_CaseStudy_2022.pdf?ext=.pdf",
"id": "61a48047-a1ba-4dfa-85d3-889875267b48",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Co-managed IT Services",
"industry": "Manufacturing & Distribution",
"title": "Collaborative Communication Solved This Co-Managed IT Relocation Project",
"truncatedTitle": "Collaborative Communication Solved This ...",
"content": "<p>The North American sales and distribution office of a European sports equipment manufacturer...</p>\r\n",
"truncatedContent": "The North American sales and distribution office of a European sports equipment manufacturer...\r\n ",
"link": "/longmontco612/Resources/Collaborative-Communication-Solved-This-Co-Managed",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/29/2020 2:15:05 PM",
"tags": [{
"name": "Co-managed IT Services",
"link": "?topic=Co-managed IT Services"
}, {
"name": "Manufacturing & Distribution",
"link": "?industries=Manufacturing & Distribution"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/From-IT-Complacency-to-IT-Peace-of-Mind/RetailPOS_CaseStudy_2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "19a5e614-9e14-4b4f-b96a-cb94e5c61d4e",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Business Continuity|Information Security",
"industry": "Accounting",
"title": "From IT Complacency to IT Peace of Mind",
"truncatedTitle": "From IT Complacency to IT Peace of Mind ",
"content": "<p>Among all of the tasks and responsibilities a business owner must manage, the IT infrastructure typically receives the least amount of attention while being one of the most critical components of most businesses. </p>\r\n",
"truncatedContent": "Among all of the tasks and responsibilities a business owner must manage, the IT infrastructure typically receives the least amount of attention while ...",
"link": "/longmontco612/Resources/From-IT-Complacency-to-IT-Peace-of-Mind",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/29/2020 2:12:44 PM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "/getattachment/e4a36299-ef34-47ca-a746-ae3245ceeae8/PatientRecords_0520_webformat.pdf.aspx?lang=en-US&ext=.pdf",
"id": "78e8bfad-e9b3-46c4-a02d-1b2b0e9287db",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Business Continuity|Outsourcing IT",
"industry": "Healthcare",
"title": "Healing Patient Records Management Workflow",
"truncatedTitle": "Healing Patient Records Management Workflow ",
"content": "<p>A home health hospice company that services patients through eight locations had purchased a document management software system that was a huge investment for them, but it was never implemented. </p>\r\n",
"truncatedContent": "A home health hospice company that services patients through eight locations had purchased a document management software system that was a huge investment ...",
"link": "/longmontco612/Resources/Healing-Patient-Records-Management-Workflow",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/29/2020 2:10:41 PM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/Microbrewer-Taps-TeamLogic-IT-to-Upgrade-Its-Custo/CustExperienceBrewery_CaseStudy_2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "a15da971-3084-4b43-b086-00d268d8db05",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Managed Services|Unified Communications",
"industry": "Accounting",
"title": "Microbrewer Taps Us to Upgrade Its CE",
"truncatedTitle": "Microbrewer Taps Us to Upgrade Its CE ",
"content": "<p>When the co-founder of a brewery and restaurant set out to transform a former NASA support facility into an out-of-this-world experience.</p>\r\n",
"truncatedContent": "When the co-founder of a brewery and restaurant set out to transform a former NASA support facility into an out-of-this-world experience.\r\n ",
"link": "/longmontco612/Resources/Microbrewer-Taps-TeamLogic-IT-to-Upgrade-Its-Custo",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/29/2020 2:07:25 PM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Unified Communications",
"link": "?topic=Unified Communications"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "/getattachment/a30d3f07-46a8-4679-90ad-dc478253c58c/CountyAppraiser_0520_webformat.pdf.aspx?lang=en-US&ext=.pdf",
"id": "11020de6-98bf-4b82-9554-19911e25d4d1",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Business Continuity|Cybersecurity",
"industry": "Financial & Insurance|Accounting",
"title": "County Appraiser's Office Endures Natural Disaster, Deflects Ransomware",
"truncatedTitle": "County Appraiser's Office Endures Natural ...",
"content": "<p>Floridians are famous for enduring hurricanes but in this digital age, another threat to Florida’s people and businesses looms—not in the physical world, but in the virtual realm: ransomware. </p>\r\n",
"truncatedContent": "Floridians are famous for enduring hurricanes but in this digital age, another threat to Florida’s people and businesses looms—not in the physical world, ...",
"link": "/longmontco612/Resources/County-Appraiser-s-Office-Endures-Natural-Disaster",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/29/2020 2:04:29 PM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/TeamLogic-IT-Enables-Local-College-to-Recover-from/TLIT-Bus-Cont-Email-2-College_CaseStudy.pdf.aspx?lang=en-US&ext=.pdf",
"id": "35e2cfb4-ff46-430e-8eca-b4d957415366",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Business Continuity",
"industry": "Education",
"title": "Enabling Local College to Recover from Fire on the Same Day",
"truncatedTitle": "Enabling Local College to Recover from ...",
"content": "<p>When fire struck the server room of a local college one day during the early hours, TeamLogic IT enabled the school to hold classes within hours. </p>\r\n",
"truncatedContent": "When fire struck the server room of a local college one day during the early hours, TeamLogic IT enabled the school to hold classes within hours. \r\n ",
"link": "/longmontco612/Resources/TeamLogic-IT-Enables-Local-College-to-Recover-from",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/29/2020 2:01:49 PM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "Education",
"link": "?industries=Education"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/A-Case-Study-in-Backup-and-Disaster-Recovery/TLIT-Backup-And-Recovery_CaseStudy_2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "f33d2b68-a05e-4928-b40c-356ad97e1dc1",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Managed Services",
"industry": "Manufacturing & Distribution",
"title": "A Case Study in Backup and Disaster Recovery",
"truncatedTitle": "A Case Study in Backup and Disaster Recovery ",
"content": "<p>When our client’s hardware failure resulted in a data loss that was difficult for them to recover, they quickly realized the difference between an outsourced vendor and a trusted technology advisor. </p>\r\n",
"truncatedContent": "When our client’s hardware failure resulted in a data loss that was difficult for them to recover, they quickly realized the difference between an outsourced ...",
"link": "/longmontco612/Resources/A-Case-Study-in-Backup-and-Disaster-Recovery",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/29/2020 1:59:53 PM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Manufacturing & Distribution",
"link": "?industries=Manufacturing & Distribution"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/Crossing-the-Road-to-Connectivity/AutoConnectivity_CaseStudy_2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "972aaab6-dadf-4bb1-936b-c67b1c92b7f1",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Managed Services",
"industry": "Manufacturing & Distribution",
"title": "Crossing the Road to Connectivity",
"truncatedTitle": "Crossing the Road to Connectivity ",
"content": "<p>Our client is a large automotive dealership comprised of 10 new car franchises, five service and parts centers, a collision repair facility, auto glass repair and replacement services, and two professional detail centers. </p>\r\n",
"truncatedContent": "Our client is a large automotive dealership comprised of 10 new car franchises, five service and parts centers, a collision repair facility, auto glass ...",
"link": "/longmontco612/Resources/Crossing-the-Road-to-Connectivity",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/29/2020 1:58:07 PM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Manufacturing & Distribution",
"link": "?industries=Manufacturing & Distribution"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/Ultimate-Disaster-Recovery-Checklist/TLChecklist_DisasterRecovery_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "a678a1db-e538-4cbb-a7c0-2554373ed852",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Checklists",
"topic": "Business Continuity",
"industry": "Legal Services",
"title": "Ultimate Disaster Recovery Checklist",
"truncatedTitle": "Ultimate Disaster Recovery Checklist ",
"content": "<p>Prepare yourself before disaster strikes. When it comes to data backup and disaster recovery (BUDR), being prepared for potential disasters is key to keeping your business running. It’s not only important to have a disaster recovery solution you trust, but to make sure you test it as well.</p>\r\n",
"truncatedContent": "Prepare yourself before disaster strikes. When it comes to data backup and disaster recovery (BUDR), being prepared for potential disasters is key to ...",
"link": "/longmontco612/Resources/Ultimate-Disaster-Recovery-Checklist",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/29/2020 12:12:34 PM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "Legal Services",
"link": "?industries=Legal Services"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/Information-Security-Risks-7-Warning-Signs/TLTipSheet_SevenWarningSigns_2023-1.pdf.aspx?lang=en-US&ext=.pdf",
"id": "d16ca62a-c706-43c6-84e6-c597eaaf6ffd",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Tip Sheets",
"topic": "Information Security",
"industry": "General-All",
"title": "Information Security Risks 7 Warning Signs",
"truncatedTitle": "Information Security Risks 7 Warning Signs ",
"content": "<p>According to the Appriver Global Security Report, in Q2 2016 malware traffic expanded for the fourth straight quarter. Their security team noted 5.7 billion messages containing malware, mostly from ransomware. Botnet distribution of malware remained a popular conduit.</p>\r\n",
"truncatedContent": "According to the Appriver Global Security Report, in Q2 2016 malware traffic expanded for the fourth straight quarter. Their security team noted 5.7 ...",
"link": "/longmontco612/Resources/Information-Security-Risks-7-Warning-Signs",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/29/2020 12:06:35 PM",
"tags": [{
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/Quick-Tips-for-Managing-Business-Email/TLTipSheet_EmailMgmt_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "dda4c855-3627-494b-9fcb-79263401fc5f",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Tip Sheets",
"topic": "Business Continuity",
"industry": "General-All",
"title": "Quick Tips for Managing Business Email",
"truncatedTitle": "Quick Tips for Managing Business Email ",
"content": "Establish email policies for all employees–Create and enforce policies, from time management rules to security precautions.",
"truncatedContent": "Establish email policies for all employees–Create and enforce policies, from time management rules to security precautions. ",
"link": "/longmontco612/Resources/Quick-Tips-for-Managing-Business-Email",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/29/2020 12:01:42 PM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/Remote-Workforce/TLChecklist_WorkFromHome_2023-1.pdf.aspx?lang=en-US&ext=.pdf",
"id": "e81cc428-142b-4b85-9e1a-b76470aa988a",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Checklists",
"topic": "Remote workforce",
"industry": "Non-Profit",
"title": "Remote Workforce",
"truncatedTitle": "Remote Workforce ",
"content": "<p>For many companies, asking employees to work from home has become the new normal. Below is a checklist to help you understand your readiness to provide a highly secure and stable environment for your remote workers as well as your business.</p>\r\n",
"truncatedContent": "For many companies, asking employees to work from home has become the new normal. Below is a checklist to help you understand your readiness to provide ...",
"link": "/longmontco612/Resources/Remote-Workforce",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/29/2020 11:56:48 AM",
"tags": [{
"name": "Remote workforce",
"link": "?topic=Remote workforce"
}, {
"name": "Non-Profit",
"link": "?industries=Non-Profit"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/The-Business-of-Technology/Capabilities_Brochure-1.pdf.aspx?lang=en-US&ext=.pdf",
"id": "41846520-b806-44aa-9b58-b49fd8a4cf93",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Brochures",
"topic": "Managed Services",
"industry": "Accounting",
"title": "Capabilities Brochure",
"truncatedTitle": "Capabilities Brochure ",
"content": "Business is about people. Technology is the engine that drives it. This is why TeamLogic IT focuses on people first and tech next. ",
"truncatedContent": "Business is about people. Technology is the engine that drives it. This is why TeamLogic IT focuses on people first and tech next. ",
"link": "/longmontco612/Resources/The-Business-of-Technology",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/ebb7eb17-8ca6-49c0-b40a-5515f6e93eb8/attachment.aspx",
"postDate": "6/29/2020 11:54:33 AM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "/getattachment/98c127b9-0de1-458d-9b00-cc709e5d1c9e/Infographic-Security.pdf.aspx?lang=en-US&ext=.pdf",
"id": "ed2441d2-f204-47c8-8e7b-7e5e9a7b38a1",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Infographics",
"topic": "Information Security",
"industry": "Healthcare",
"title": "Information Security Risks",
"truncatedTitle": "Information Security Risks ",
"content": "97% of malware is unique to a specific endpoint, rendering signature-based security virutally useless.",
"truncatedContent": "97% of malware is unique to a specific endpoint, rendering signature-based security virutally useless. ",
"link": "/longmontco612/Resources/Information-Security-Risks",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/29/2020 11:52:21 AM",
"tags": [{
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "/getattachment/7d82b1df-2ed7-4553-8d20-3fdf740eb694/Datto-10RansomwareStatistics.pdf.aspx?lang=en-US&ext=.pdf",
"id": "185f6599-094c-410e-a0d1-9a1efc5d06a5",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Checklists",
"topic": "Cybersecurity",
"industry": "Financial & Insurance",
"title": "10 Ransomware Statistics",
"truncatedTitle": "10 Ransomware Statistics ",
"content": "10 ransomware statistics all businesses MUST know",
"truncatedContent": "10 ransomware statistics all businesses MUST know ",
"link": "/longmontco612/Resources/10-Ransomware-Statistics",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/29/2020 11:50:40 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/Wireless-Network-Services/WirelessNetwork_2021.pdf.aspx?lang=en-US&ext=.pdf",
"id": "115aa99d-a79f-4803-8399-d93468beea32",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Unified Communications",
"industry": "Accounting",
"title": "Wireless Network Services and Support",
"truncatedTitle": "Wireless Network Services and Support ",
"content": "<p>Whether you’re going to the office next door, down the hall to a conference room or over to your warehouse, you can always be connected to the information you need with a wireless network. </p>\r\n",
"truncatedContent": "Whether you’re going to the office next door, down the hall to a conference room or over to your warehouse, you can always be connected to the information ...",
"link": "/longmontco612/Resources/Wireless-Network-Services",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/29/2020 11:30:47 AM",
"tags": [{
"name": "Unified Communications",
"link": "?topic=Unified Communications"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "",
"id": "b37828fc-36d2-42eb-aba1-73253feeb6af",
"isGated": true,
"isBlog": false,
"isFeatured": false,
"category": "Briefs & Whitepapers",
"topic": "Outsourcing IT",
"industry": "Manufacturing & Distribution",
"title": "Changing IT Suppliers: Inhouse or Outsource",
"truncatedTitle": "Changing IT Suppliers: Inhouse or Outsource ",
"content": "<p>You know that you have outgrown your current IT supplier and you need to make a critical decision to either change suppliers or hire someone and bring your IT solutions in-house but you have a lot of questions. Which is the right choice? What factors should you consider? How will the transition work?</p>\r\n",
"truncatedContent": "You know that you have outgrown your current IT supplier and you need to make a critical decision to either change suppliers or hire someone and bring ...",
"link": "/longmontco612/Resources/Outsourced-IT-Services",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/29/2020 11:29:03 AM",
"tags": [{
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "Manufacturing & Distribution",
"link": "?industries=Manufacturing & Distribution"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/Digital-Transformation-Dissolves-Organizational-Si/TLInsights_StrategicTech_2023.pdf.aspx?lang=en-US&ext=.pdf",
"id": "4edfdd4d-5aaa-42d0-9fd5-1b6da949ceda",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Tip Sheets",
"topic": "Business Continuity|Managed Services",
"industry": "Financial & Insurance",
"title": "Digital Transformation Dissolves Organizational Silos",
"truncatedTitle": "Digital Transformation Dissolves Organizational ...",
"content": "<p><em><strong>43% of companies indicate that technology is an enabler for business process, 39% feel that they are using technology to drive business goals, such as enhancing efficiency or innovation.” </strong></em></p>\r\n",
"truncatedContent": "43% of companies indicate that technology is an enabler for business process, 39% feel that they are using technology to drive business goals, such as ...",
"link": "/longmontco612/Resources/Digital-Transformation-Dissolves-Organizational-Si",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/29/2020 11:07:24 AM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "/TeamlogicIT/media/TLIT-Images/Resources/Info%20Sheets/TLIT-Data-BackUp-Recovery-Info-Sheet_2022.pdf?ext=.pdf",
"id": "3a537690-56ae-4f32-8ad7-b7c34600d3f1",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Business Continuity",
"industry": "Financial & Insurance",
"title": "Data Backup and Recovery",
"truncatedTitle": "Data Backup and Recovery ",
"content": "<p>Ensuring the ability to quickly recover and access your data and systems from a crash, disaster or health crisis is the goal of our data backup and recovery services.</p>\r\n",
"truncatedContent": "Ensuring the ability to quickly recover and access your data and systems from a crash, disaster or health crisis is the goal of our data backup and recovery ...",
"link": "/longmontco612/Resources/Data-Backup-and-Recovery",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/29/2020 10:52:26 AM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "/TeamlogicIT/media/TLIT-Images/Resources/Info%20Sheets/TLIT-Cybersecurity-Assessment-Info-Sheet_2022.pdf?ext=.pdf",
"id": "c8a5f8af-e6ba-4de5-b48a-70d2851a6043",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Cybersecurity",
"industry": "Accounting",
"title": "Cybersecurity Assessment",
"truncatedTitle": "Cybersecurity Assessment ",
"content": "<p>The Cybersecurity Assessment looks at your most important IT infrastructure, applications, data and procedures and, through risk, policy and device-level reviews, identifies areas that might need improvement or remediation. </p>\r\n",
"truncatedContent": "The Cybersecurity Assessment looks at your most important IT infrastructure, applications, data and procedures and, through risk, policy and device-level ...",
"link": "/longmontco612/Resources/Cybersecurity-Assessment",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/29/2020 10:39:48 AM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "",
"id": "83cab471-f1bd-4d05-94de-89d551539d33",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Business Continuity",
"industry": "Financial & Insurance|Accounting",
"title": "Data Backup: Choose Wisely, Worry Less",
"truncatedTitle": "Data Backup: Choose Wisely, Worry Less ",
"content": "Laptop theft, accidental deletion, hijacking by malware, and of course, hack attacks can be a big problem for small businesses.",
"truncatedContent": "Laptop theft, accidental deletion, hijacking by malware, and of course, hack attacks can be a big problem for small businesses. ",
"link": "/longmontco612/Resources/Data-Backup-Choose-Wisely-Worry-Less",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "6/17/2020 3:07:36 AM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "",
"id": "65a953ab-355f-4832-911f-83e2dbfa5bc1",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Financial & Insurance",
"title": "Robust Passwords Are Only a Start",
"truncatedTitle": "Robust Passwords Are Only a Start ",
"content": "For most companies, securing email begins with defining and enforcing password-hygiene best practices, and training employees to spot and report suspicious-looking messages.",
"truncatedContent": "For most companies, securing email begins with defining and enforcing password-hygiene best practices, and training employees to spot and report suspicious-looking ...",
"link": "/longmontco612/Resources/Robust-Passwords-Are-Only-a-Start",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/e828736f-b3ac-4920-ab0a-a4322547d135/attachment.aspx",
"postDate": "5/27/2020 3:50:23 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "65a953ab-355f-4832-911f-83e2dbfa5bc1",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "Financial & Insurance",
"title": "Robust Passwords Are Only a Start",
"truncatedTitle": "Robust Passwords Are Only a Start ",
"content": "For most companies, securing email begins with defining and enforcing password-hygiene best practices, and training employees to spot and report suspicious-looking messages.",
"truncatedContent": "For most companies, securing email begins with defining and enforcing password-hygiene best practices, and training employees to spot and report suspicious-looking ...",
"link": "/longmontco612/Resources/Robust-Passwords-Are-Only-a-Start-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/e828736f-b3ac-4920-ab0a-a4322547d135/attachment.aspx",
"postDate": "5/27/2020 3:50:23 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Financial & Insurance",
"link": "?industries=Financial & Insurance"
}]
}, {
"download": "",
"id": "50c39919-71b5-4ce6-8ec1-73799d836ab2",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Business Continuity",
"industry": "General-All",
"title": "Business Continuity Planning for Small Business: Make Today the Day.",
"truncatedTitle": "Business Continuity Planning for Small ...",
"content": "The pandemic of 2020 took the world by surprise, with certain groups, including small business owners, bearing the brunt of the deadly outbreak.",
"truncatedContent": "The pandemic of 2020 took the world by surprise, with certain groups, including small business owners, bearing the brunt of the deadly outbreak. ",
"link": "/longmontco612/Resources/Business-Continuity-Planning-for-Small-Business-Ma",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/8d05aace-6ced-4ae3-a43b-fc7b6abb3d22/attachment.aspx",
"postDate": "5/20/2020 3:33:16 AM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "4eda50d5-c1c7-4f1a-8462-04e92c0b3163",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity|Trends",
"industry": "General-All",
"title": "Security Tips for Repelling COVID-themed Scams",
"truncatedTitle": "Security Tips for Repelling COVID-themed ...",
"content": "In mid-April, Sophos security experts identified more than 1,700 malicious domains using “corona” or “covid” in their names.",
"truncatedContent": "In mid-April, Sophos security experts identified more than 1,700 malicious domains using “corona” or “covid” in their names. ",
"link": "/longmontco612/Resources/Security-Awareness-Tips-for-Repelling-COVID-themed",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/e27b102c-5f04-4f1e-8aa4-8a2c81497e9c/attachment.aspx",
"postDate": "5/13/2020 3:25:05 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "f442466e-42ba-4e3b-8311-b503310e6e75",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "2019 Verizon Report Not All Gloom and Doom",
"truncatedTitle": "2019 Verizon Report Not All Gloom and Doom ",
"content": "<br />\r\nThe most recent version (from 2019) was compiled from real-world stats spanning more than 41,000 cybersecurity incidents and 2,000+ data breaches from 73 public and private global entities.",
"truncatedContent": "\r\nThe most recent version (from 2019) was compiled from real-world stats spanning more than 41,000 cybersecurity incidents and 2,000+ data breaches from ...",
"link": "/longmontco612/Resources/2019-Verizon-Report-Not-All-Gloom-and-Doom",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/a79051d7-76a4-4be1-bbd8-790e6cd6e6b8/attachment.aspx",
"postDate": "5/6/2020 3:17:50 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "44ad9da7-54af-493e-98f6-3e41c5880ab1",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Videos",
"topic": "Managed Services",
"industry": "Education",
"title": "Prevent Security Breaches with TeamLogic IT",
"truncatedTitle": "Prevent Security Breaches with TeamLogic ...",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/Prevent-Security-Breaches-with-TeamLogic-IT",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "https://www.youtube.com/embed/x-e7Pt1HuLk",
"image": null,
"postDate": "5/5/2020 4:08:54 PM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Education",
"link": "?industries=Education"
}]
}, {
"download": "",
"id": "9b7ee5a1-bdd6-42ac-a2c4-3c5b44c7a6ec",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Videos",
"topic": "Managed Services",
"industry": "Education",
"title": "5 Reasons Why You Need an MSP",
"truncatedTitle": "5 Reasons Why You Need an MSP ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/5-Reasons-Why-You-Need-an-MSP",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "https://www.youtube.com/embed/kX0gmSYqoZM",
"image": null,
"postDate": "5/5/2020 3:58:30 PM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Education",
"link": "?industries=Education"
}]
}, {
"download": "",
"id": "5ae6423f-d244-4460-acf1-4dde44729a35",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Videos",
"topic": "Managed Services|Unified Communications",
"industry": "General-All",
"title": "Managed Services with TeamLogic IT",
"truncatedTitle": "Managed Services with TeamLogic IT ",
"content": "",
"truncatedContent": "",
"link": "/longmontco612/Resources/Telephony-and-VoIP-Systems",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "https://player.vimeo.com/video/105716916",
"image": null,
"postDate": "5/5/2020 12:05:04 PM",
"tags": [{
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "Unified Communications",
"link": "?topic=Unified Communications"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "af044b69-076f-4f4f-94e7-9f030e256b77",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Briefs & Whitepapers",
"topic": "Business Continuity",
"industry": "Healthcare",
"title": "Request a Consultation",
"truncatedTitle": "Request a Consultation ",
"content": "A consultation with Teamlogic IT will help you better understand what to expect from your in-house or outsourced IT team to ensure your technology investments are aligned with your business needs and objectives. We will be in contact with you soon.",
"truncatedContent": "A consultation with Teamlogic IT will help you better understand what to expect from your in-house or outsourced IT team to ensure your technology investments ...",
"link": "/longmontco612/Resources/Get-a-Free-Consultation-1",
"ctaLink": "/longmontco612/Request-A-Consultation",
"background": false,
"type": "",
"cta": "Request a Consultation",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "4/21/2020 12:12:33 PM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "",
"id": "9f38f2b1-cae3-4cfd-94a3-015905015645",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Cloud Computing",
"industry": "Healthcare",
"title": "New Office Location Excels In The Cloud",
"truncatedTitle": "New Office Location Excels In The Cloud ",
"content": "New Office Location Excels In The Cloud",
"truncatedContent": "New Office Location Excels In The Cloud ",
"link": "/longmontco612/Resources/New-Office-Location-Excels-In-The-Cloud",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/20055148-96f9-4467-a4f9-eda78fc0092c/attachment.aspx",
"postDate": "4/9/2020 12:23:55 PM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "",
"id": "0838df3a-9a5c-4de0-97eb-b3ad3871a148",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Outsourcing IT",
"industry": "Healthcare",
"title": "Managed IT Services Keeps This Dental Practice In Business",
"truncatedTitle": "Managed IT Services Keeps This Dental Practice ...",
"content": "<br />\r\nManaged IT Services Keeps This Dental Practice In Business",
"truncatedContent": "\r\nManaged IT Services Keeps This Dental Practice In Business ",
"link": "/longmontco612/Resources/Managed-IT-Services-Keeps-This-Dental-Practice-In",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/b790a84a-c21c-4509-a827-15127d68f376/attachment.aspx",
"postDate": "2/17/2020 4:40:02 PM",
"tags": [{
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "/TeamlogicIT/media/TLIT-Images/Resources/Case%20Studies/Architect_CaseStudy_2022.pdf?ext=.pdf",
"id": "32bba71f-fe2b-4d4c-8f42-092ab9e7d6dc",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Outsourcing IT",
"industry": "Construction & Contracting",
"title": "3 Times a Charm When TeamLogic IT Comes to the Rescue ",
"truncatedTitle": "3 Times a Charm When TeamLogic IT Comes ...",
"content": "<p><br />\r\nAn architectural design consulting company had been using an independent IT service provider but were unhappy with his service.</p>\r\n",
"truncatedContent": "\r\nAn architectural design consulting company had been using an independent IT service provider but were unhappy with his service.\r\n ",
"link": "/longmontco612/Resources/Three-Times-a-Charm-When-TeamLogic-IT-Comes-to-the",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "2/17/2020 4:35:53 PM",
"tags": [{
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "Construction & Contracting",
"link": "?industries=Construction & Contracting"
}]
}, {
"download": "",
"id": "12d0ee1f-5164-4af1-9989-5db338b057c3",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Outsourcing IT",
"industry": "Non-Profit",
"title": "Country Club Hits a Hole-in-One Outsourcing to TeamLogic IT",
"truncatedTitle": "Country Club Hits a Hole-in-One Outsourcing ...",
"content": "Country Club Hits a Hole-in-One Outsourcing to TeamLogic IT\r\n",
"truncatedContent": "Country Club Hits a Hole-in-One Outsourcing to TeamLogic IT\r\n ",
"link": "/longmontco612/Resources/Country-Club-Hits-a-Hole-in-One-Outsourcing-to-Tea",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/c60f3ac4-9a5b-4bf4-be53-fecc36767359/attachment.aspx",
"postDate": "2/17/2020 3:56:50 PM",
"tags": [{
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "Non-Profit",
"link": "?industries=Non-Profit"
}]
}, {
"download": "/TeamlogicIT/media/TLIT-Images/Resources/Case%20Studies/Accounting_CaseStudy_2022.pdf?ext=.pdf",
"id": "52407774-cb55-40da-8421-6d1765070f5c",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Outsourcing IT",
"industry": "Accounting",
"title": "Finally Finding an IT Provider They Can Count On",
"truncatedTitle": "Finally Finding an IT Provider They Can ...",
"content": "<p>After a decade spent transitioning from one disappointing IT provider to the next, the owner of a payroll and bookkeeping firm finally called TeamLogic IT with a laundry list of technology upgrades to increase their productivity and efficiency, and to enhance their ability to provide their customers with a higher level of customer service and the utmost security for their private financial information.</p>\r\n",
"truncatedContent": "After a decade spent transitioning from one disappointing IT provider to the next, the owner of a payroll and bookkeeping firm finally called TeamLogic ...",
"link": "/longmontco612/Resources/Finally-Finding-an-IT-Provider-They-Can-Count-On",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "2/17/2020 3:54:17 PM",
"tags": [{
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "Accounting",
"link": "?industries=Accounting"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/Keeping-Up-with-Growth-Requires-The-Right-Technolo/Construction_0520_webformat.pdf.aspx?lang=en-US&ext=.pdf",
"id": "b12c96bc-63cf-441f-bfda-551fdac3442b",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Outsourcing IT",
"industry": "Construction & Contracting",
"title": "Keeping Up with Growth Requires The Right Technology",
"truncatedTitle": "Keeping Up with Growth Requires The Right ...",
"content": "<p>Business had been booming for a family-owned construction company, yet this family business was almost a victim of its own success when the owners found that their company’s technology wasn’t prepared to grow at the pace of the rest of their business. </p>\r\n",
"truncatedContent": "Business had been booming for a family-owned construction company, yet this family business was almost a victim of its own success when the owners found ...",
"link": "/longmontco612/Resources/Keeping-Up-with-Growth-Requires-The-Right-Technolo",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/11485695-3b96-4bed-801f-f0be75cdb4d5/attachment.aspx",
"postDate": "2/17/2020 3:52:01 PM",
"tags": [{
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "Construction & Contracting",
"link": "?industries=Construction & Contracting"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/Outsourcing-IT-A-Healthy-Solution-for-This-Non-pro/HealthcareNonProfit_CaseStudy_2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "10b609f3-5763-4233-ac29-155e4088fc88",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Outsourcing IT",
"industry": "Healthcare|Non-Profit",
"title": "A Healthy Solution for This Non-profit",
"truncatedTitle": "A Healthy Solution for This Non-profit ",
"content": "<p>The Counseling Center is a mental health services facility that provides diverse counseling solutions, education and community outreach. </p>\r\n",
"truncatedContent": "The Counseling Center is a mental health services facility that provides diverse counseling solutions, education and community outreach. \r\n ",
"link": "/longmontco612/Resources/Outsourcing-IT-A-Healthy-Solution-for-This-Non-pro",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "2/17/2020 3:41:22 PM",
"tags": [{
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}, {
"name": "Non-Profit",
"link": "?industries=Non-Profit"
}]
}, {
"download": "",
"id": "e33802be-b22f-4fd1-a6fa-2d831501b1ca",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Telecommunications",
"industry": "Manufacturing & Distribution",
"title": "Customer Experience Upgrades",
"truncatedTitle": "Customer Experience Upgrades ",
"content": "Customer Experience Upgrades",
"truncatedContent": "Customer Experience Upgrades ",
"link": "/longmontco612/Resources/Customer-Experience-Upgrades",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/517d67f0-c991-40f0-a222-f1feb9c51cb4/attachment.aspx",
"postDate": "2/17/2020 3:38:55 PM",
"tags": [{
"name": "Telecommunications",
"link": "?topic=Telecommunications"
}, {
"name": "Manufacturing & Distribution",
"link": "?industries=Manufacturing & Distribution"
}]
}, {
"download": "",
"id": "3abbe061-0b8d-4da2-902b-8ec298798403",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Outsourcing IT",
"industry": "Manufacturing & Distribution",
"title": "Productivity Improves With Proactive IT Management",
"truncatedTitle": "Productivity Improves With Proactive IT ...",
"content": "Productivity Improves With Proactive IT Management",
"truncatedContent": "Productivity Improves With Proactive IT Management ",
"link": "/longmontco612/Resources/Productivity-Improves-With-Proactive-IT-Management",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/0d13adfc-165f-4d38-89fb-96443eaac45b/attachment.aspx",
"postDate": "2/17/2020 3:35:34 PM",
"tags": [{
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "Manufacturing & Distribution",
"link": "?industries=Manufacturing & Distribution"
}]
}, {
"download": "",
"id": "3ab9dce5-9143-4c3a-a3a6-1a9b4d31ff41",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Outsourcing IT",
"industry": "Manufacturing & Distribution",
"title": "No More Sticker Shock With Managed Services",
"truncatedTitle": "No More Sticker Shock With Managed Services ",
"content": "No More Sticker Shock With Managed Services",
"truncatedContent": "No More Sticker Shock With Managed Services ",
"link": "/longmontco612/Resources/No-More-Sticker-Shock-With-Managed-Services",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/d8168220-9871-4bad-baf1-efa20fddd5e8/attachment.aspx",
"postDate": "2/17/2020 3:23:52 PM",
"tags": [{
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "Manufacturing & Distribution",
"link": "?industries=Manufacturing & Distribution"
}]
}, {
"download": "",
"id": "b0e510cc-f5ee-4464-b20f-7515c3e79728",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Mobility",
"industry": "Non-Profit",
"title": "Non-Profit Overcomes Race-day IT Challenges",
"truncatedTitle": "Non-Profit Overcomes Race-day IT Challenges ",
"content": "Non-Profit Overcomes Race-day IT Challenges",
"truncatedContent": "Non-Profit Overcomes Race-day IT Challenges ",
"link": "/longmontco612/Resources/Non-Profit-Overcomes-Race-day-IT-Challenges",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/734cd55a-b0d3-497e-a096-31a4d50b3616/attachment.aspx",
"postDate": "2/17/2020 3:19:45 PM",
"tags": [{
"name": "Mobility",
"link": "?topic=Mobility"
}, {
"name": "Non-Profit",
"link": "?industries=Non-Profit"
}]
}, {
"download": "",
"id": "d1a0a329-61ba-4d36-b175-ad8d90e83aa5",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Trends",
"industry": "General-All",
"title": "Retail Company Pleased with Seamless Transition to Server",
"truncatedTitle": "Retail Company Pleased with Seamless Transition ...",
"content": "Retail Company Pleased with Seamless Transition to Server",
"truncatedContent": "Retail Company Pleased with Seamless Transition to Server ",
"link": "/longmontco612/Resources/Retail-Company-Pleased-with-Seamless-Transition-to",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/69926417-fda4-49ae-a29a-dfa33b0903e7/attachment.aspx",
"postDate": "2/17/2020 3:18:04 PM",
"tags": [{
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "bb1be4ca-60b7-4991-b7d2-9aac77c52646",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Outsourcing IT",
"industry": "Healthcare",
"title": "Spa Franchise Profits From An IT Overhaul From TeamLogic IT",
"truncatedTitle": "Spa Franchise Profits From An IT Overhaul ...",
"content": "Spa Franchise Profits From An IT Overhaul From TeamLogic IT",
"truncatedContent": "Spa Franchise Profits From An IT Overhaul From TeamLogic IT ",
"link": "/longmontco612/Resources/Spa-Franchise-Profits-From-An-IT-Overhaul-From-Tea",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/3d18f456-a5c6-40a9-bac7-3eb077643946/attachment.aspx",
"postDate": "2/17/2020 3:16:34 PM",
"tags": [{
"name": "Outsourcing IT",
"link": "?topic=Outsourcing IT"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}, {
"download": "/getattachment/Franchise-Shared-Content/Resources/TeamLogic-IT-Helps-Unclog-A-Paperwork-Bottleneck/Plumber_CaseStudy_2022.pdf.aspx?lang=en-US&ext=.pdf",
"id": "d2e8ed95-c9ad-41eb-9cc7-8a29e42ee87b",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Trends",
"industry": "Construction & Contracting",
"title": "Unclogging A Paperwork Bottleneck",
"truncatedTitle": "Unclogging A Paperwork Bottleneck ",
"content": "<p>When the owner of a plumbing company moved into shared office space with his office manager, it didn’t take him long to realize the large amount of paper processing that was circulating throughout his business. </p>\r\n",
"truncatedContent": "When the owner of a plumbing company moved into shared office space with his office manager, it didn’t take him long to realize the large amount of paper ...",
"link": "/longmontco612/Resources/TeamLogic-IT-Helps-Unclog-A-Paperwork-Bottleneck",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "2/17/2020 3:11:07 PM",
"tags": [{
"name": "Trends",
"link": "?topic=Trends"
}, {
"name": "Construction & Contracting",
"link": "?industries=Construction & Contracting"
}]
}, {
"download": "/TeamlogicIT/media/TLIT-Images/Resources/Whitepapers/TLIT-Cloud-Whitepaper_-2022.pdf?ext=.pdf",
"id": "0e2b1711-ce6e-457b-a2cb-6daddb458aed",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Briefs & Whitepapers",
"topic": "Cloud Computing",
"industry": "Legal Services",
"title": "Cloud Computing",
"truncatedTitle": "Cloud Computing ",
"content": "Leverage the cloud to strengthen your company's competitive advantages",
"truncatedContent": "Leverage the cloud to strengthen your company's competitive advantages ",
"link": "/longmontco612/Resources/Leverage-the-Cloud-to-Strengthen-Your-Company-s-Co",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": "/getattachment/3b222e04-108f-4d26-9806-d3fc78531840/attachment.aspx",
"postDate": "2/17/2020 2:45:46 PM",
"tags": [{
"name": "Cloud Computing",
"link": "?topic=Cloud Computing"
}, {
"name": "Legal Services",
"link": "?industries=Legal Services"
}]
}, {
"download": "",
"id": "e7dc6915-2cf5-45e9-b730-e83b9102e2fb",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Business Continuity",
"industry": "Non-Profit",
"title": "Business Continuity in Action: TeamLogic IT Enables Local College to Recover from Fire Same Day",
"truncatedTitle": "Business Continuity in Action: TeamLogic ...",
"content": "When fire struck the server room of a local college one day during the early hours, TeamLogic IT in Newtown, PA enabled the school to hold classes within hours.",
"truncatedContent": "When fire struck the server room of a local college one day during the early hours, TeamLogic IT in Newtown, PA enabled the school to hold classes within ...",
"link": "/longmontco612/Resources/When-Fire-Strikes-So-Does-TeamLogic-IT",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "2/12/2020 1:59:10 PM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "Non-Profit",
"link": "?industries=Non-Profit"
}]
}, {
"download": "",
"id": "e7dc6915-2cf5-45e9-b730-e83b9102e2fb",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Case Studies",
"topic": "Business Continuity",
"industry": "Non-Profit",
"title": "Business Continuity in Action: TeamLogic IT Enables Local College to Recover from Fire Same Day",
"truncatedTitle": "Business Continuity in Action: TeamLogic ...",
"content": "When fire struck the server room of a local college one day during the early hours, TeamLogic IT in Newtown, PA enabled the school to hold classes within hours.",
"truncatedContent": "When fire struck the server room of a local college one day during the early hours, TeamLogic IT in Newtown, PA enabled the school to hold classes within ...",
"link": "/longmontco612/Resources/When-Fire-Strikes-So-Does-TeamLogic-IT-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "2/12/2020 1:59:10 PM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "Non-Profit",
"link": "?industries=Non-Profit"
}]
}, {
"download": "",
"id": "31e19d8d-eb2b-4e6e-81d2-83d01779e14b",
"isGated": true,
"isBlog": false,
"isFeatured": false,
"category": "Briefs & Whitepapers",
"topic": "Cybersecurity",
"industry": "General-All",
"title": "The Cybersecurity Survival Guide for Small- and Medium-Sized Businesses",
"truncatedTitle": "The Cybersecurity Survival Guide for Small- ...",
"content": "Your company’s data is squarely in the cross-hairs of criminals. While breaches of Fortune 500 organizations still capture the occasional headline, the number and severity of those attacks pale in comparison to those launched against small- and medium-sized businesses every day.",
"truncatedContent": "Your company’s data is squarely in the cross-hairs of criminals. While breaches of Fortune 500 organizations still capture the occasional headline, the ...",
"link": "/longmontco612/Resources/The-Cybersecurity-Survival-Guide-for-Small-and-Med",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "2/12/2020 1:48:13 PM",
"tags": [{
"name": "Cybersecurity",
"link": "?topic=Cybersecurity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "/TeamlogicIT/media/TLIT-Images/About/BUDRWhitepaper_2021.pdf?ext=.pdf",
"id": "34ee612f-de9c-4128-9bf6-d18b662c2f00",
"isGated": false,
"isBlog": false,
"isFeatured": false,
"category": "Info Sheets",
"topic": "Business Continuity",
"industry": "General-All",
"title": "Business Continuity",
"truncatedTitle": "Business Continuity ",
"content": "The Disaster Survival Guide for Small- and Mid-Size Businesses",
"truncatedContent": "The Disaster Survival Guide for Small- and Mid-Size Businesses ",
"link": "/longmontco612/Resources/The-Disaster-Survival-Guide-for-Small-and-Mid-Size",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "2/12/2020 1:41:55 PM",
"tags": [{
"name": "Business Continuity",
"link": "?topic=Business Continuity"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "6859f232-7d0b-4ca9-9448-32447bbfded8",
"isGated": true,
"isBlog": false,
"isFeatured": false,
"category": "Briefs & Whitepapers",
"topic": "Information Security|Managed Services",
"industry": "General-All",
"title": "Be Done with Downtime: Increase Security, Improve Productivity and Boost Your Bottom Line",
"truncatedTitle": "Be Done with Downtime: Increase Security, ...",
"content": "TeamLogic IT professionals can conduct a comprehensive assessment of your computer systems to determine the most appropriate solution to meet your current and future business needs.",
"truncatedContent": "TeamLogic IT professionals can conduct a comprehensive assessment of your computer systems to determine the most appropriate solution to meet your current ...",
"link": "/longmontco612/Resources/Be-Done-with-Downtime-Increase-Security-Improve-P",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "",
"image": null,
"postDate": "11/14/2019 12:00:00 AM",
"tags": [{
"name": "Information Security",
"link": "?topic=Information Security"
}, {
"name": "Managed Services",
"link": "?topic=Managed Services"
}, {
"name": "General-All",
"link": "?industries=General-All"
}]
}, {
"download": "",
"id": "28ab630d-2c5a-4165-9bb4-e3fa147a81db",
"isGated": false,
"isBlog": true,
"isFeatured": false,
"category": "Blog",
"topic": "Mobility",
"industry": "Healthcare",
"title": "BYOD Refresher: Are You Protecting Business and Personal Data on Mobile Devices?",
"truncatedTitle": "BYOD Refresher: Are You Protecting Business ...",
"content": "<img alt=\"byod-protection\" border=\"0\" src=\"/uploadedImages/TeamLogic_IT/Content/Blog/Blogs/thumb_byod-protection.jpg\" style=\"float: right;\" title=\"byod-protection\" /> In a world where mobile devices outnumber people, the trend toward people using their own smartphones and tablets for business purposes is inescapable.",
"truncatedContent": " In a world where mobile devices outnumber people, the trend toward people using their own smartphones and tablets for business purposes is inescapable. ",
"link": "/longmontco612/Resources/BYOD-Refresher-Are-You-Protecting-Business-and-1",
"ctaLink": "/longmontco612/",
"background": false,
"type": "card",
"cta": "",
"ctaDisplayOrder": 4,
"video": "n/a",
"image": "/getattachment/affcc513-8af9-4599-a0af-37371e043c71/attachment.aspx",
"postDate": "10/25/2017 9:42:26 AM",
"tags": [{
"name": "Mobility",
"link": "?topic=Mobility"
}, {
"name": "Healthcare",
"link": "?industries=Healthcare"
}]
}]
};
window.resourceFilters = {
"topics": [{
"name": "Business Continuity"
}, {
"name": "Cloud Computing"
}, {
"name": "Compliance"
}, {
"name": "Cybersecurity"
}, {
"name": "Information Security"
}, {
"name": "Managed Services"
}, {
"name": "Mobility"
}, {
"name": "Outsourcing IT"
}, {
"name": "Data/Voice/Connectivity"
}, {
"name": "Trends"
}, {
"name": "Unified Communications"
}, {
"name": "Remote workforce"
}, {
"name": "Co-managed IT Services"
}],
"types": [{
"name": "Briefs & Whitepapers"
}, {
"name": "Case Studies"
}, {
"name": "Videos"
}, {
"name": "Blog"
}, {
"name": "Checklists"
}, {
"name": "Info Sheets"
}, {
"name": "Tip Sheets"
}, {
"name": "Newsletters"
}, {
"name": "Brochures"
}, {
"name": "Infographics"
}],
"industries": [{
"name": "Healthcare"
}, {
"name": "Legal Services"
}, {
"name": "Financial & Insurance"
}, {
"name": "Manufacturing & Distribution"
}, {
"name": "Construction & Contracting"
}, {
"name": "Non-Profit"
}, {
"name": "Education"
}, {
"name": "Accounting"
}, {
"name": "General-All"
}, {
"name": "Automotive"
}]
}
function addLoader() {
var $loaderContainer = $(".loading-container");
var $resourceCards = $(".resources-card-grid > .cell")
if ($resourceCards.length > 0) {
$resourceCards.toggleClass("hidden");
$loaderContainer.toggleClass("hidden");
setTimeout(function() {
$resourceCards.toggleClass("hidden");
$loaderContainer.toggleClass("hidden");
}, 1000);
}
}
$(document).on('click', '.reset li, .previous i, .next i', function(e) {
addLoader();
$('html, body').animate({
scrollTop: $('#resourcesApp').offset().top - 200
}, 500);
});
$(document).on('change', 'select', function(e) {
addLoader();
})
$(document).on('click', '.clear-filters', function(e) {
addLoader();
})
</script>
<div id="resourcesApp">
<div class="container resources-page">
<div class="grid-x grid-margin-x margin-bottom-15 resource-filters-search-filter-container">
<div class="filters cell large-8 medium-8 small-12 small-order-2 text-right large-text-left large-order-1">
<p class="resources-filter-by margin-left-auto margin-right-2 show-for-large"><strong>Filter By:</strong></p>
<ul class="accordion no-border no-icon-on-desktop">
<li class="accordion-item" closeonmobile="">
<div tabindex="0" class="accordion-header accordion-header-active">
<p class="margin-left-auto margin-right-2 hide-for-large"><strong>FILTERS</strong></p>
</div>
<div class="accordion-content">
<ul><label for="topic" class="hide-ally-element">filter resources by topic</label> <select name="topic" id="topic" class="small-input margin-right-1">
<option selected="selected" value="all">Topic</option>
<option value="Business Continuity"> Business Continuity </option>
<option value="Cloud Computing"> Cloud Computing </option>
<option value="Compliance"> Compliance </option>
<option value="Cybersecurity"> Cybersecurity </option>
<option value="Information Security"> Information Security </option>
<option value="Managed Services"> Managed Services </option>
<option value="Mobility"> Mobility </option>
<option value="Outsourcing IT"> Outsourcing IT </option>
<option value="Data/Voice/Connectivity"> Data/Voice/Connectivity </option>
<option value="Trends"> Trends </option>
<option value="Unified Communications"> Unified Communications </option>
<option value="Remote workforce"> Remote workforce </option>
<option value="Co-managed IT Services"> Co-managed IT Services </option>
</select> <label for="type" class="hide-ally-element">filter resources by type</label> <select name="type" id="type" class="small-input margin-right-1">
<option selected="selected" value="all">Type</option>
<option value="Briefs & Whitepapers"> Briefs & Whitepapers </option>
<option value="Case Studies"> Case Studies </option>
<option value="Videos"> Videos </option>
<option value="Blog"> Blog </option>
<option value="Checklists"> Checklists </option>
<option value="Info Sheets"> Info Sheets </option>
<option value="Tip Sheets"> Tip Sheets </option>
<option value="Newsletters"> Newsletters </option>
<option value="Brochures"> Brochures </option>
<option value="Infographics"> Infographics </option>
</select> <label for="industries" class="hide-ally-element">filter resources by industries</label> <select name="industries" id="industries" class="small-input">
<option selected="selected" value="all">Industries</option>
<option value="Healthcare"> Healthcare </option>
<option value="Legal Services"> Legal Services </option>
<option value="Financial & Insurance"> Financial & Insurance </option>
<option value="Manufacturing & Distribution"> Manufacturing & Distribution </option>
<option value="Construction & Contracting"> Construction & Contracting </option>
<option value="Non-Profit"> Non-Profit </option>
<option value="Education"> Education </option>
<option value="Accounting"> Accounting </option>
<option value="General-All"> General-All </option>
<option value="Automotive"> Automotive </option>
</select> <label for="sortby-mobile" class="display-inline hide-for-large"><strong> Sort by: </strong></label> <select name="sortby-mobile" id="sortby-mobile" class="padding-right-2 hide-for-large">
<option selected="selected" value="latest">Latest</option>
<option value="oldest">Oldest</option>
<option value="descending">A -> Z</option>
<option value="ascending">Z -> A</option>
</select>
<p class="clear-filters"><a tabindex="0" aria-label="clear filters">Click here to clear your filters.</a></p>
</ul>
</div>
</li>
</ul>
<h2 class="like-h4 strong show-for-large">Featured Resources</h2>
</div>
<div class="resource-filters-search-container cell large-4 medium-4 small-12 small-order-1 large-order-2 text-left align-right large-text-right"><label for="search" class="hide-ally-element">Search Resources</label> <input type="text"
id="search" name="search" placeholder="Search Resources"> <label for="sortby" class="display-inline show-for-large margin-right-1"><strong> Sort by: </strong></label> <select name="sortby" id="sortby"
class="small-input padding-right-2 show-for-large">
<option selected="selected" value="latest">Latest</option>
<option value="oldest">Oldest</option>
<option value="descending">A -> Z</option>
<option value="ascending">Z -> A</option>`
</select></div>
</div>
<h2 class="like-h4 strong hide-for-large margin-bottom-15">Featured Resources</h2>
<div class="grid-x grid-margin-x grid-margin-y resources-card-grid">
<div class="large-12 loading-container hidden">
<div class="resource-loader"></div>
</div>
<div class="cell large-8">
<div class="card">
<div class="grid-y">
<div class="cell content">
<div class="content-wrapper">
<div class="category"> Videos <span class="featured-resource" style="float: right;">Featured</span> <span style="float: right;"> Oct 19, 2022 </span></div>
<h3>
<a data-download="" data-resource="11572a06-49c8-4167-b168-e302eba050b2" data-isfeatured="true" data-postdate="10/19/2022 8:41:06 AM" data-posttitle="TeamLogic IT - The Difference Maker" data-isblog="false" data-isgated="false" href="/longmontco612/Resources/Managed-Services-with-TeamLogic-IT" class="card-title">TeamLogic IT - The Difference Maker </a>
</h3>
<div class="video">
<div class="responsive-embed widescreen"><iframe src="https://player.vimeo.com/video/757356055" width="1240" height="700" frameborder="0" allow="autoplay; fullscreen" allowfullscreen="allowfullscreen"></iframe></div>
</div> <!----> <!---->
</div>
</div>
<div class="cell tags">
<ul>
<li>Tag:</li>
<li><a href="?topic=Managed Services">Managed Services</a></li>
<li><a href="?industries=General-All">General-All</a></li>
</ul>
</div>
</div>
</div>
</div>
<div class="cell large-4">
<div class="card">
<div class="grid-y">
<div class="cell content">
<div class="content-wrapper blog">
<div class="category"> Blog <!----> <span style="float: right;"> Apr 4, 2023 </span></div>
<h3>
<a data-download="" data-resource="8caac43e-df21-49f2-b485-c10dc2abdfce" data-isfeatured="false" data-postdate="4/4/2023 8:00:00 AM" data-posttitle="Winning the IT ‘Transformation Race’" data-isblog="true" data-image="/getattachment/71aed35e-c471-4b48-8ac5-afb7ff4cd83b/attachment.aspx" data-isgated="false" href="/longmontco612/Resources/Winning-the-IT-Transformation-Race" class="card-title">Winning the IT ‘Transformation Race’ </a>
</h3> <!----> <!---->
<p data-postcontent="<img alt="operationtransformation.jpg" src="/getattachment/699dd46c-66de-403c-b89c-6b964228bc49/operationtransformation.jpg.aspx?width=300&height=212" style="width: 300px; height: 212px; float: right;" title="operationtransformation.jpg" />COVID-era priorities proved businesses of all types and sizes could transform operations with digital technology at a rapid pace in the face of crisis. Now, despite waning pandemic conditions, pressure to accelerate digital transformation continues.<br />
">COVID-era priorities proved businesses of all types and sizes could transform operations with digital technology at a rapid pace in the face of crisis. ...</p>
</div>
</div>
<div class="cell tags">
<ul>
<li>Tag:</li>
<li><a href="?topic=Cybersecurity">Cybersecurity</a></li>
<li><a href="?topic=Information Security">Information Security</a></li>
<li><a href="?industries=General-All">General-All</a></li>
</ul>
</div>
</div>
</div>
</div>
<div class="cell large-4">
<div class="card">
<div class="grid-y">
<div class="cell content">
<div class="content-wrapper">
<div class="category"> Newsletters <!----> <span style="float: right;"> Apr 1, 2023 </span></div>
<h3>
<a data-download="/getattachment/e324fc90-a082-4d40-8020-aa923d8b2d66/LogicalAdvantage_Apr2023.pdf.aspx?lang=en-US&ext=.pdf" data-resource="c165fdb1-58ab-4f61-bf2a-4be456f884b8" data-isfeatured="false" data-postdate="4/1/2023 8:00:00 AM" data-posttitle="The Logical Advantage April 2023" data-isblog="false" data-isgated="false" href="/longmontco612/Resources/The-Logical-Advantage-April-2023" class="card-title">The Logical Advantage April 2023 </a>
</h3> <!----> <!----> <!---->
</div>
</div>
<div class="cell tags">
<ul>
<li>Tag:</li>
<li><a href="?topic=Cybersecurity">Cybersecurity</a></li>
<li><a href="?industries=General-All">General-All</a></li>
</ul>
</div>
</div>
</div>
</div>
<div class="cell large-4">
<div class="card">
<div class="grid-y">
<div class="cell content">
<div class="content-wrapper blog">
<div class="category"> Blog <!----> <span style="float: right;"> Mar 28, 2023 </span></div>
<h3>
<a data-download="" data-resource="65cf3779-c273-4512-a1e7-527c079758fe" data-isfeatured="false" data-postdate="3/28/2023 7:54:12 AM" data-posttitle="Phishing Season Never Ends" data-isblog="true" data-image="/getattachment/69c9a6df-2f61-461a-9963-4b3a99dd2d3b/attachment.aspx" data-isgated="false" href="/longmontco612/Resources/Phishing-Season-Never-Ends" class="card-title">Phishing Season Never Ends </a>
</h3> <!----> <!---->
<p
data-postcontent="<img alt="Phishing.jpg" src="/getattachment/1bdbf6f2-3c70-4e82-a50b-a5d6bea8c249/Phishing.jpg.aspx?width=300&height=120" style="width: 300px; height: 120px; float: right;" title="Phishing.jpg" />A big spike in phishing, the most prevalent form of business email compromise (BEC), occurred along with the rise in hybrid work arrangements. As more companies and employees embrace remote work arrangements, company communications may become more vulnerable to cybercriminals.">
A big spike in phishing, the most prevalent form of business email compromise (BEC), occurred along with the rise in hybrid work arrangements. As more ...</p>
</div>
</div>
<div class="cell tags">
<ul>
<li>Tag:</li>
<li><a href="?topic=Cybersecurity">Cybersecurity</a></li>
<li><a href="?industries=General-All">General-All</a></li>
</ul>
</div>
</div>
</div>
</div>
<div class="cell large-4">
<div class="cta-box green">
<div class="grid-y">
<div class="cell content">
<div class="content-wrapper">
<h3>Request a Consultation</h3>
<p>A consultation with Teamlogic IT will help you better understand what to expect from your in-house or outsourced IT team to ensure your technology investments are aligned with your business needs and objectives. We will be in
contact with you soon.</p>
</div>
</div>
<div class="cell buttons text-center"><!----> <a href="/longmontco612/Request-A-Consultation" class="button ghost">Request a Consultation</a></div> <!---->
</div>
</div>
</div>
<div class="cell large-4">
<div class="card">
<div class="grid-y">
<div class="cell content">
<div class="content-wrapper blog">
<div class="category"> Blog <!----> <span style="float: right;"> Mar 21, 2023 </span></div>
<h3>
<a data-download="" data-resource="d4ae8a8e-f0ad-4520-bad6-7edd6421baeb" data-isfeatured="false" data-postdate="3/21/2023 11:48:20 AM" data-posttitle="Cloud Continues as a Strategic Priority" data-isblog="true" data-image="/getattachment/47702d5a-9f25-4585-b52a-5b7d31875479/attachment.aspx" data-isgated="false" href="/longmontco612/Resources/Cloud-Continues-as-a-Strategic-Priority" class="card-title">Cloud Continues as a Strategic Priority </a>
</h3> <!----> <!---->
<p data-postcontent="More than three-quarters of finance leaders plan to continue investing in digital technologies this year, according to research from Gartner. These analysts predict CFOs will maintain or increase IT spending regardless of inflation levels or interest rate hikes. One area where CFOs plan to concentrate spending is in cloud solutions.<img alt="cloudcomputing.png" src="/getattachment/c3ffbe7b-2c59-40de-bc70-b6bf1f0b2b75/cloudcomputing.png.aspx?width=300&height=155" style="width: 300px; height: 155px; float: right;" title="cloudcomputing.png" /><br />
">More than three-quarters of finance leaders plan to continue investing in digital technologies this year, according to research from Gartner. These analysts ...</p>
</div>
</div>
<div class="cell tags">
<ul>
<li>Tag:</li>
<li><a href="?topic=Cloud Computing">Cloud Computing</a></li>
<li><a href="?industries=General-All">General-All</a></li>
</ul>
</div>
</div>
</div>
</div>
<div class="cell large-4">
<div class="card">
<div class="grid-y">
<div class="cell content">
<div class="content-wrapper">
<div class="category"> Info Sheets <!----> <span style="float: right;"> Mar 14, 2023 </span></div>
<h3>
<a data-download="/TeamlogicIT/media/TLIT-Images/Resources/Info%20Sheets/ManagedITServicesinfoSheet_2023.pdf?ext=.pdf" data-resource="2364e6ba-dab9-4645-bb13-c2eeb3f16f81" data-isfeatured="false" data-postdate="3/14/2023 12:00:58 PM" data-posttitle="Managed IT Services" data-isblog="false" data-isgated="false" href="/longmontco612/Resources/Managed-IT-Services" class="card-title">Managed IT Services </a>
</h3> <!----> <!---->
<p data-postcontent="<p>Not a day goes by without technology impacting your business. Whether it’s email, servers or Internet access, you rely on it, plain and simple. </p>
">Not a day goes by without technology impacting your business. Whether it’s email, servers or Internet access, you rely on it, plain and simple. </p>
</div>
</div>
<div class="cell tags">
<ul>
<li>Tag:</li>
<li><a href="?topic=Managed Services">Managed Services</a></li>
<li><a href="?industries=Legal Services">Legal Services</a></li>
</ul>
</div>
</div>
</div>
</div>
<div class="cell large-4">
<div class="card">
<div class="grid-y">
<div class="cell content">
<div class="content-wrapper">
<div class="category"> Info Sheets <!----> <span style="float: right;"> Mar 14, 2023 </span></div>
<h3>
<a data-download="/TeamlogicIT/media/TLIT-Images/Resources/Info%20Sheets/Co-Managed-IT-Services_2023.pdf?ext=.pdf" data-resource="35194d24-97d8-41a1-9282-232540d49f04" data-isfeatured="false" data-postdate="3/14/2023 11:52:45 AM" data-posttitle="Co-Managed IT Services" data-isblog="false" data-isgated="false" href="/longmontco612/Resources/Sometimes-a-Dedicated-Staff-Is-Not-Enough" class="card-title">Co-Managed IT Services </a>
</h3> <!----> <!---->
<p data-postcontent="<p>Internal IT staff are spread thin and may not have the broad spectrum of skills required to keep up with the ever-evolving landscape of technology. What’s more, over employment in the IT workforce has made it difficult to recruit and retain technical resources creating exposure and risk for many organizations. </p>
">Internal IT staff are spread thin and may not have the broad spectrum of skills required to keep up with the ever-evolving landscape of technology. What’s ...</p>
</div>
</div>
<div class="cell tags">
<ul>
<li>Tag:</li>
<li><a href="?topic=Co-managed IT Services">Co-managed IT Services</a></li>
<li><a href="?industries=General-All">General-All</a></li>
</ul>
</div>
</div>
</div>
</div>
</div>
<div class="pagination padding-vertical-2"><!---->
<ul class="reset"><!---->
<li><a tabindex="0" class="current">1</a></li>
<li><a tabindex="0" class="">2</a></li>
<li><a tabindex="0" class="">3</a></li>
<li><a tabindex="0" class="">4</a></li>
<li><a tabindex="0" class="">5</a></li>
<li><a tabindex="0">...</a></li>
</ul>
<div tabindex="0" class="next"><i class="fas fa-angle-right"></i></div>
</div>
</div>
<div id="upGatedContent">
<div id="dialog-form" class="modal gated-content-modal">
<div class="grid-x grid-margin-x grid-margin-y">
<div class="cell small-12 medium-4">
<div class="article-title">
<h5></h5>
</div>
<div class="article-content"></div>
</div>
<div class="cell small-12 medium-4">
<div class="gated-content-preview"></div>
</div>
<div class="cell small-12 medium-4">
<div id="viewBiz">
<div id="pnlForm" onkeypress="javascript:return WebForm_FireDefaultButton(event, 'btnOK')" class="FormPanel">
<div class="cell small-6 medium-auto">
<h5 class="resources-modal-form-title">Get Your Free Guide </h5> <label> First Name <div id="iFirstName"><input
name="p$lt$ctl03$pageplaceholder$p$lt$ctl02$ResourcesWithFiltering$tlForm$viewBiz$ctl00$iFirstName$fcFirstName$txtText" type="text" maxlength="200" id="txtText" class="form-control"></div></label> <label> Last Name <div
id="iLastName"><input name="p$lt$ctl03$pageplaceholder$p$lt$ctl02$ResourcesWithFiltering$tlForm$viewBiz$ctl00$iLastName$fcLastName$txtText" type="text" maxlength="200" id="txtText" class="form-control"></div></label> <label>
Email <div id="iEmail"><input name="p$lt$ctl03$pageplaceholder$p$lt$ctl02$ResourcesWithFiltering$tlForm$viewBiz$ctl00$iEmail$fcEmail$txtEmailInput" type="text" maxlength="254" id="txtEmailInput" class="form-control"> <span
id="revEmailValid" class="form-control-error" style="display: none;"></span></div></label> <label>
<div id="iNewsletterSignUp"><span class="newsletter-sign-up-control-container checkbox"><input id="checkbox" type="checkbox"
name="p$lt$ctl03$pageplaceholder$p$lt$ctl02$ResourcesWithFiltering$tlForm$viewBiz$ctl00$iNewsletterSignUp$fcNewsletterSignUp$checkbox"><label for="checkbox"> </label></span></div> I would also like to receive the
latest news and events from TeamLogic IT
</label>
<div class="form-group">
<div class="editing-form-label-cell"></div>
<div class="editing-form-value-cell"><input type="submit" name="p$lt$ctl03$pageplaceholder$p$lt$ctl02$ResourcesWithFiltering$tlForm$viewBiz$ctl00$btnOK" value="Submit" id="btnOK"
class="FormButton button ghost-black add-loader btn btn-primary"></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div> <input type="hidden" name="p$lt$ctl03$pageplaceholder$p$lt$ctl02$ResourcesWithFiltering$dlLink" id="dlLink">
</div> <input type="hidden" name="p$lt$ctl03$pageplaceholder$p$lt$ctl02$ResourcesWithFiltering$hidResource" id="hidResource">
<p><a href="#dialog-form" id="openModal" rel="modal:open" class="hidden">Open Modal</a></p>
</div>
<script type="text/javascript" src="/CMSScripts/Custom/gatedResourcesHandler.js"></script>
<script type="text/javascript">
Sys.WebForms.PageRequestManager.getInstance().add_endRequest(EndRequestHandler);
function EndRequestHandler(sender, args) {
if ($("#dlLink").val() !== "") {
window.open($("#dlLink").val(), '_blank');
}
$("body").css("overflow", "auto");
$(".jquery-modal").appendTo($("#upGatedContent"));
var resource = $("#hidResource").val();
console.log(resource);
var $anchor = $('a[data-resource=' + resource + ']');
console.log($anchor);
if ($anchor.length > 0) {
$("#openModal")[0].click();
$(".jquery-modal").appendTo($("#upGatedContent"));
window.setModalContent($anchor);
}
if ($('#dialog-form .InfoLabel').length > 0) {
// set html
var $messageHtml = $('#dialog-form .InfoLabel').html();
$('#dialog-form .InfoLabel').html($("<h5>").addClass("resources-modal-form-title").html($messageHtml));
}
}
</script>
<script type="text/javascript">
Vue.use(httpVueLoader);
new Vue({
el: '#resourcesApp',
components: {
'resources': 'url:../../CMSScripts/Custom/vue/pages/ResourcesPage.vue'
}
});
</script>
</main>
<footer class="local">
<div class="container">
<div class="grid-x grid-margin-x">
<div class="cell large-3 content">
<div class="margin-bottom-2 text-center large-text-left">
<a href="/longmontco612"><img alt="team logic logo" src="/TeamlogicIT/media/TLIT-Images/Global/TLIT-logo.png"></a>
</div>
<p class="text-center large-text-left"><a class="button" href="/longmontco612/Request-A-Consultation">request consultation </a></p>
<p class="text-center large-text-left like-h5 phone"><a href="tel:720-927-5700">720-927-5700</a></p>
<p class="text-center large-text-left"><strong>Longmont, CO</strong>
<br>255 Weaver Park Road, <br>Suite 200, <br>Longmont, CO 80501 <br><a class="contact" href="/longmontco612/Contact-Us">Contact Us</a>
</p>
<ul class="social-links show-for-large">
<li><a href="https://www.facebook.com/TeamLogic-IT-105683451113115/?view_public_for=105683451113115" class="no-background"><i class="fab fa-facebook-f"> </i></a></li>
<li><a href="https://twitter.com/TeamLogicIT" class="no-background"><i class="fab fa-twitter"> </i></a></li>
<li><a href="https://www.linkedin.com/in/mark-vanata/" class="no-background"><i class="fab fa-linkedin-in"> </i></a></li>
<li><a href="https://www.youtube.com/channel/UCdle1R4-BgFxIMl-74nohvQ?view_as=subscriber" class="no-background"><i class="fab fa-youtube"> </i></a></li>
</ul>
</div>
<div class="cell large-2 menus">
<ul class="accordion no-border-on-desktop servicesfooter" data-v-b4ad3f10="">
<li class="accordion-item" data-v-b4ad3f10="" data-v-ea86fa54="">
<div class="accordion-header accordion-header-active mobile-only" data-v-ea86fa54="" tabindex="0">
<h6 data-v-ea86fa54="">services</h6>
<div class="accordion-icon" data-v-ea86fa54=""> </div>
</div>
<div class="accordion-content" data-v-ea86fa54="" style="">
<ul data-v-ea86fa54="">
<li>
<ul class="menu">
<li><a href="/longmontco612/Services-Overview">Services Overview</a></li>
<li class=""><a href="/longmontco612/Services-Overview/Managed-IT-Services">Managed IT Services</a></li>
<li class=""><a href="/longmontco612/Services-Overview/Cloud-Services">Cloud Services</a></li>
<li class=""><a href="/longmontco612/Services-Overview/Cybersecurity">Cybersecurity & Compliance</a></li>
<li class=""><a href="/longmontco612/Services-Overview/Data-Backup-Recovery">Data Backup & Recovery</a></li>
<li class=""><a href="/longmontco612/Services-Overview/Business-Application-Services">Business Application Services</a></li>
<li class=""><a href="/longmontco612/Services-Overview/Data-Voice-Connectivity">Data / Voice / Connectivity</a></li>
<li class=""><a href="/longmontco612/Services-Overview/Business-Risk-Assessments">Business Risk Assessments</a></li>
<li class=""><a href="/longmontco612/Services-Overview/IT-Projects-Support">IT Projects & Support</a></li>
<li class=""><a href="/longmontco612/Services-Overview/Industries">Industries</a></li>
</ul>
</li>
</ul>
</div>
</li>
</ul>
</div>
<div class="cell large-2">
<ul class="accordion no-border-on-desktop" data-v-b4ad3f10="">
<li class="accordion-item" data-v-b4ad3f10="" data-v-ea86fa54="">
<div class="accordion-header accordion-header-active mobile-only" data-v-ea86fa54="" tabindex="0">
<h6 data-v-ea86fa54="">why we're different</h6>
<div class="accordion-icon" data-v-ea86fa54=""> </div>
</div>
<div class="accordion-content" data-v-ea86fa54="" style="">
<ul data-v-ea86fa54="">
<li>
<ul class="menu">
<li><a href="/longmontco612/Why-We-re-Different">Overview</a></li>
</ul>
</li>
</ul>
</div>
</li>
</ul>
</div>
<div class="cell large-2">
<ul class="accordion no-border-on-desktop" data-v-b4ad3f10="">
<li class="accordion-item" data-v-b4ad3f10="" data-v-ea86fa54="">
<div class="accordion-header accordion-header-active mobile-only" data-v-ea86fa54="" tabindex="0">
<h6 data-v-ea86fa54="">about us</h6>
<div class="accordion-icon" data-v-ea86fa54=""> </div>
</div>
<div class="accordion-content" data-v-ea86fa54="" style="">
<ul data-v-ea86fa54="">
<li>
<ul class="menu">
<li><a href="/longmontco612/About-Us">About TeamLogic IT</a></li>
<li><a href="/longmontco612/About-Us/Testimonials">Testimonials</a></li>
<li><a href="/longmontco612/About-Us/News">News & Accolades</a></li>
<li><a href="/longmontco612/About-Us/Certifications">Certifications</a></li>
<li><a href="https://teamlogic-it-longmont-co.careerplug.com/" target="_blank">Careers</a></li>
<li><a href="/longmontco612/About-Us/National-Accounts-Program">National Accounts Program</a></li>
</ul>
</li>
</ul>
</div>
</li>
</ul>
</div>
<div class="cell large-2"></div>
<div class="cell large-2">
<div id="p_lt_ctl05_WebPartZone_WebPartZone_zone_On_lineForm_sys_pnlUpdate">
<div id="p_lt_ctl05_WebPartZone_WebPartZone_zone_On_lineForm_plcUp_viewBiz">
<div id="p_lt_ctl05_WebPartZone_WebPartZone_zone_On_lineForm_plcUp_viewBiz_pnlForm" class="FormPanel"
onkeypress="javascript:return WebForm_FireDefaultButton(event, 'p_lt_ctl05_WebPartZone_WebPartZone_zone_On_lineForm_plcUp_viewBiz_btnOK')">
<ul class="accordion no-border-on-desktop">
<li class="accordion-item">
<div class="accordion-header accordion-header-active mobile-only" tabindex="0">
<h6>Subscribe to our Newsletter</h6>
</div>
<div class="accordion-content subscribe" style=""><label class="hidden" for="email">Email Address</label>
<div id="p_lt_ctl05_WebPartZone_WebPartZone_zone_On_lineForm_plcUp_viewBiz_ncpemailinput" class="EditingFormControlNestedControl editing-form-control-nested-control">
<input name="p$lt$ctl05$WebPartZone$WebPartZone_zone$On_lineForm$plcUp$viewBiz$emailinput$txtEmailInput" type="text" maxlength="254"
id="p_lt_ctl05_WebPartZone_WebPartZone_zone_On_lineForm_plcUp_viewBiz_emailinput_txtEmailInput" class="form-control">
<span id="p_lt_ctl05_WebPartZone_WebPartZone_zone_On_lineForm_plcUp_viewBiz_emailinput_revEmailValid" class="form-control-error" style="display:none;"></span>
</div>
<div id="p_lt_ctl05_WebPartZone_WebPartZone_zone_On_lineForm_plcUp_viewBiz_ncpoptin" class="EditingFormControlNestedControl editing-form-control-nested-control">
<span class="CheckBoxField checkbox"><input id="p_lt_ctl05_WebPartZone_WebPartZone_zone_On_lineForm_plcUp_viewBiz_OptIn_checkbox" type="checkbox"
name="p$lt$ctl05$WebPartZone$WebPartZone_zone$On_lineForm$plcUp$viewBiz$OptIn$checkbox"><label for="p_lt_ctl05_WebPartZone_WebPartZone_zone_On_lineForm_plcUp_viewBiz_OptIn_checkbox">I would like to receive the latest
news and events from TeamLogic IT</label></span>
</div><br>
<span id="p_lt_ctl05_WebPartZone_WebPartZone_zone_On_lineForm_plcUp_viewBiz_Captcha_lb" class="EditingFormLabel"></span>
<div id="p_lt_ctl05_WebPartZone_WebPartZone_zone_On_lineForm_plcUp_viewBiz_ncpcaptcha" class="EditingFormControlNestedControl editing-form-control-nested-control">
<div id="p_lt_ctl05_WebPartZone_WebPartZone_zone_On_lineForm_plcUp_viewBiz_Captcha_pnlRecaptchaControl">
<div id="p_lt_ctl05_WebPartZone_WebPartZone_zone_On_lineForm_plcUp_viewBiz_Captcha_pnlCaptchaWrap" class="cms-recaptcha-wrap" data-rendersettings="{
"sitekey": "6Lcrj8wZAAAAAFmMyZcFUs6ZTqPTyiDBlhu3oA-g",
"theme": "light",
"type": "image",
"size": "compact"
}">
<div style="width: 164px; height: 144px;">
<div><iframe title="reCAPTCHA"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lcrj8wZAAAAAFmMyZcFUs6ZTqPTyiDBlhu3oA-g&co=aHR0cHM6Ly93d3cudGVhbWxvZ2ljaXQuY29tOjQ0Mw..&hl=en&type=image&v=NZrMWHVy58-S9gVvad9HVGxk&theme=light&size=compact&cb=vlmgeixo1zqp"
width="164" height="144" role="presentation" name="a-gbad9povf474" frameborder="0" scrolling="no"
sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe></div><textarea id="g-recaptcha-response" name="g-recaptcha-response"
class="g-recaptcha-response" style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</div><noscript>
<div>
<div style="width: 302px; height: 422px; position: relative;">
<div style="width: 302px; height: 422px; position: absolute;">
<iframe src="https://www.google.com/recaptcha/api/fallback?k=6Lcrj8wZAAAAAFmMyZcFUs6ZTqPTyiDBlhu3oA-g&hl=en" frameborder="0" scrolling="no" style="width: 302px; height:422px; border-style: none;">
</iframe>
</div>
</div>
<div style="width: 300px; height: 60px; border-style: none;
bottom: 12px; left: 25px; margin: 0px; padding: 0px; right: 25px;
background: #f9f9f9; border: 1px solid #c1c1c1; border-radius: 3px;">
<textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response" style="width: 250px; height: 40px; border: 1px solid #c1c1c1;
margin: 10px 25px; padding: 0px; resize: none;"> </textarea>
</div>
</div>
</noscript>
</div>
</div><br>
<input type="submit" name="p$lt$ctl05$WebPartZone$WebPartZone_zone$On_lineForm$plcUp$viewBiz$btnOK" value="Subscribe" id="p_lt_ctl05_WebPartZone_WebPartZone_zone_On_lineForm_plcUp_viewBiz_btnOK"
class="FormButton btn btn-primary">
</div>
</li>
</ul>
</div>
</div>
</div>
</div>
</div>
<ul class="social-links text-center hide-for-large">
<li><a href="https://www.facebook.com/TeamLogic-IT-105683451113115/?view_public_for=105683451113115" class="no-background"><i class="fab fa-facebook-f"> </i></a></li>
<li><a href="https://twitter.com/TeamLogicIT" class="no-background"><i class="fab fa-twitter"> </i></a></li>
<li><a href="https://www.linkedin.com/in/mark-vanata/" class="no-background"><i class="fab fa-linkedin-in"> </i></a></li>
<li><a href="https://www.youtube.com/channel/UCdle1R4-BgFxIMl-74nohvQ?view_as=subscriber" class="no-background"><i class="fab fa-youtube"> </i></a></li>
</ul>
<hr class="dark content">
<div class="bottom content">
<ul>
<li class="copyright">©2014-2023 TeamLogic, Inc. All rights reserved.</li>
<li><a href="/longmontco612/Utility-Pages/privacy-policy">Privacy Policy</a></li>
<li><a href="/longmontco612/Utility-Pages/gdpr-statement">GDPR Statement</a></li>
<li><a href="/longmontco612/Utility-Pages/terms-and-conditions">Terms & Conditions</a></li>
<li><a href="/longmontco612/Utility-Pages/environmental-message">Environmental Message</a></li>
<li><a href="/longmontco612/Utility-Pages/accessibility">Accessibility Notice</a></li>
<li><a href="/longmontco612/Utility-Pages/Sitemap">Sitemap</a></li>
</ul>
<p style="text-align:center;">This business is independently owned and operated.</p>
</div>
</div>
<script src="/CMSScripts/Custom/cookieDisclaimerHandler.js"></script>
<div class="cookie-disclaimer-container" style="">
<div class="container">
<i class="fas fa-times cookie-disclaimer-close"></i>
<p class="cookie-disclaimer-text">We use cookies to better understand how you use our website so that we can improve your experience. By continuing to browse or closing this banner, you indicate your agreement. To learn more, please visit
our <a class="cookie-disclaimer-privacy-policy" href="/privacy-policy/" title="Privacy Policy">Privacy Policy</a>.</p>
</div>
</div>
</footer>
</div>
</form>
Text Content
* Change Text Size: * * English ▼ ›English ›Arabic ›Belarusian ›Brunei ›Bulgarian ›Catalan ›Chinese (Simplified) ›Chinese (Traditional) ›Croatian ›Czech ›Danish ›Dutch ›Estonian ›Filipino ›Finnish ›French ›Galician ›German ›Greek ›Hebrew ›Hungarian ›Icelandic ›Indian ›Indonesian ›Italian ›Japanese ›Korean ›Latvian ›Lithuanian ›Malaysian ›Maltese ›Norwegian ›Polish ›Portuguese ›Romanian ›Russian ›Serbian ›Slovak ›Slovenian ›South African ›Spanish ›Swedish ›Thai ›Turkish ›Ukrainian ›Vietnamese * Client Login * Blog Search for: Menu * * Services Back * Services Overview * Managed IT Services Managed IT Services Overview * Cloud Services Cloud Services Overview * Cloud Migration & Management * Cloud Backup and Storage * Cloud Security * VoIP * Office 365 * DaaS / IaaS * Cybersecurity & Compliance Cybersecurity & Compliance Overview * Cybersecurity Advanced Solutions * Compliance & Regulatory Services * HIPAA * Data Backup & Recovery Data Backup & Recovery Overview * Business Continuity * Business Application Services Business Application Services Overview * Data / Voice / Connectivity Data / Voice / Connectivity Overview * Internet & Wireless Networks * SD-WAN * Phone Systems * Unified Communications * Business Risk Assessments Business Risk Assessments Overview * Network Assessment * Cloud Readiness Assessment * Cybersecurity Assessment * Wireless Assessment * IT Downtime Calculator * HIPAA Assessment * Compliance Review * IT Projects & Support IT Projects & Support Overview * IT Consulting * Co-Managed Services * Remote Workforce * IT Procurement Services * Structured Cabling * IT Relocation Services * Virtualization * Server & Network Design * vCIO * Industries Industries Overview * Healthcare * Legal Services * Financial & Insurance * Manufacturing & Distribution * Non-Profit * Construction & Contracting * Education * Accounting * Why We're Different * About Us Back * About TeamLogic IT * Testimonials * News & Accolades * Certifications * Careers * National Accounts Program * Resources * Support * Contact Us * Blog * Login * Change Text Size: Longmont, CO 720-927-5700 request a consultation RESOURCES * Home / Resources * Share * Filter By: * FILTERS filter resources by topic Topic Business Continuity Cloud Computing Compliance Cybersecurity Information Security Managed Services Mobility Outsourcing IT Data/Voice/Connectivity Trends Unified Communications Remote workforce Co-managed IT Services filter resources by type Type Briefs & Whitepapers Case Studies Videos Blog Checklists Info Sheets Tip Sheets Newsletters Brochures Infographics filter resources by industries Industries Healthcare Legal Services Financial & Insurance Manufacturing & Distribution Construction & Contracting Non-Profit Education Accounting General-All Automotive Sort by: Latest Oldest A -> Z Z -> A Click here to clear your filters. FEATURED RESOURCES Search Resources Sort by: Latest Oldest A -> Z Z -> A` FEATURED RESOURCES Videos Featured Oct 19, 2022 TEAMLOGIC IT - THE DIFFERENCE MAKER * Tag: * Managed Services * General-All Blog Apr 4, 2023 WINNING THE IT ‘TRANSFORMATION RACE’ COVID-era priorities proved businesses of all types and sizes could transform operations with digital technology at a rapid pace in the face of crisis. ... * Tag: * Cybersecurity * Information Security * General-All Newsletters Apr 1, 2023 THE LOGICAL ADVANTAGE APRIL 2023 * Tag: * Cybersecurity * General-All Blog Mar 28, 2023 PHISHING SEASON NEVER ENDS A big spike in phishing, the most prevalent form of business email compromise (BEC), occurred along with the rise in hybrid work arrangements. As more ... * Tag: * Cybersecurity * General-All REQUEST A CONSULTATION A consultation with Teamlogic IT will help you better understand what to expect from your in-house or outsourced IT team to ensure your technology investments are aligned with your business needs and objectives. We will be in contact with you soon. Request a Consultation Blog Mar 21, 2023 CLOUD CONTINUES AS A STRATEGIC PRIORITY More than three-quarters of finance leaders plan to continue investing in digital technologies this year, according to research from Gartner. These analysts ... * Tag: * Cloud Computing * General-All Info Sheets Mar 14, 2023 MANAGED IT SERVICES Not a day goes by without technology impacting your business. Whether it’s email, servers or Internet access, you rely on it, plain and simple. * Tag: * Managed Services * Legal Services Info Sheets Mar 14, 2023 CO-MANAGED IT SERVICES Internal IT staff are spread thin and may not have the broad spectrum of skills required to keep up with the ever-evolving landscape of technology. What’s ... * Tag: * Co-managed IT Services * General-All * 1 * 2 * 3 * 4 * 5 * ... GET YOUR FREE GUIDE First Name Last Name Email I would also like to receive the latest news and events from TeamLogic IT Open Modal request consultation 720-927-5700 Longmont, CO 255 Weaver Park Road, Suite 200, Longmont, CO 80501 Contact Us * * * * * SERVICES * * Services Overview * Managed IT Services * Cloud Services * Cybersecurity & Compliance * Data Backup & Recovery * Business Application Services * Data / Voice / Connectivity * Business Risk Assessments * IT Projects & Support * Industries * WHY WE'RE DIFFERENT * * Overview * ABOUT US * * About TeamLogic IT * Testimonials * News & Accolades * Certifications * Careers * National Accounts Program * SUBSCRIBE TO OUR NEWSLETTER Email Address I would like to receive the latest news and events from TeamLogic IT * * * * -------------------------------------------------------------------------------- * ©2014-2023 TeamLogic, Inc. All rights reserved. * Privacy Policy * GDPR Statement * Terms & Conditions * Environmental Message * Accessibility Notice * Sitemap This business is independently owned and operated. We use cookies to better understand how you use our website so that we can improve your experience. By continuing to browse or closing this banner, you indicate your agreement. To learn more, please visit our Privacy Policy. ORIGINALTEXT Bessere Übersetzung vorschlagen --------------------------------------------------------------------------------