The Centrality Source Wednesday, June 22, 2022 Why We Keep Talking About Password Security read more Wednesday, June 8, 2022 Keep Your Business Safe From Ice Phishing read more Wednesday, May 25, 2022 The Complexity Of Social Engineering Attacks read more Wednesday, May 11, 2022 Three Hardest Email Threat Types To Detect read more Wednesday, April 27, 2022 Enterprise-Level Security Protection For All Businesses read more Tuesday, April 12, 2022 Managed Backup Recovers Your Business Data Fast read more Wednesday, March 30, 2022 Version 100 In Chrome And Firefox read more Conflict In Ukraine Ultimately Strengthens Cybersecurity read more Wednesday, March 9, 2022 Cyber Insurance Won’t Save You From Ransomware read more Wednesday, February 23, 2022 Data Breaches Reached Another All-Time High In 2021 read more Attack and Threat Update – Critical Vulnerability read more Tuesday, February 8, 2022 Threat Spotlight: COVID-19 test-related email scams read more Wednesday, January 12, 2022 A Security-Centric Look Ahead to 2022 read more Wednesday, December 15, 2021 Seven Benefits of Cloud Email Security read more Wednesday, November 3, 2021 Are you putting cybersecurity first? read more Wednesday, October 20, 2021 Get Enterprise-class protection for your business without the enterprise-class price tag read more Wednesday, August 25, 2021 Let Us Tackle Your Security So You Can Focus on Your Business read more Wednesday, August 11, 2021 10 Reasons To Stop Debating Cloud Services read more Thursday, July 22, 2021 Ransomware Changed The View Of Data Backup read more Tuesday, July 6, 2021 Take Time Now For Your Overdue Security Review read more Wednesday, June 23, 2021 Anchor Offers Affordable CMMC v1.02 Compliance for Office, CAD, Video, and Voice Files read more Wednesday, June 9, 2021 Return to Normal Stronger And Safer read more Wednesday, May 19, 2021 What is Zero Trust Security? read more Wednesday, May 5, 2021 What is Doxware? read more Wednesday, April 7, 2021 Research Shows Remote Work Intensified Data Protection Challenges read more Wednesday, March 17, 2021 Time To Build Your Zero Trust Architecture read more Five Things Your IT Team May Not Have Mentioned read more Tuesday, March 2, 2021 Best practices to defend against evolving spear-phishing attacks read more Tuesday, February 16, 2021 Threat Spotlight: Form-based attacks read more Wednesday, January 20, 2021 Maximizing the Value of Your Existing Technology read more Wednesday, January 6, 2021 Learn About The Latest Ransomware – Doxware read more Wednesday, December 9, 2020 Proactive Cybersecurity Strategies For Small Businesses In 2021 read more Monday, October 26, 2020 Anthem pays $39.5M settlement over 2015 cyberattack read more Thursday, October 22, 2020 URGENT: Windows Domain Security Notification read more Wednesday, September 30, 2020 Five Cybersecurity Threats That Slip By Traditional Antivirus read more Thursday, September 10, 2020 The Differences Between MAV and EDR read more Wednesday, August 26, 2020 No End In Sight To COVID-19 Themed Cyberattacks read more Ransomware operators have hacked Brown-Forman read more Wednesday, August 12, 2020 Should You Use EDR To Protect Your Business? read more Tuesday, July 21, 2020 Do You Know These Costly Email Attacks? read more Tuesday, July 7, 2020 Does Your Team Know About Social Engineering? read more Wednesday, June 17, 2020 Do You Know The Most Common Email Attacks? read more Friday, May 29, 2020 What’s The New Normal For Your Business? read more Tuesday, May 12, 2020 Threat Update: Malicious Use Of reCaptcha read more Friday, April 24, 2020 Is Your I.T. Getting Praise? read more Friday, April 3, 2020 Update: Know These Covid-19 Spear-phishing Tactics read more Friday, March 20, 2020 Creating Secure Work-At-Home Environments During Covid-19 read more Monday, March 9, 2020 Security Access Requirements That Travel With Your Files read more Thursday, February 20, 2020 Fifth Third Customer Information Stolen read more Coronavirus Outbreak Is Being Used To Spread Malware read more Thursday, February 6, 2020 Ransomware Payments Doubled and Downtime Grew in Q4 read more Monday, January 27, 2020 Cybercriminals Attack Non-profit Firm With Ransomware read more Monday, January 6, 2020 Update: Defending Against Business Email Compromise Attacks read more Monday, December 9, 2019 Fight Holiday Credit Card Fraud read more A Few Benefits that Come with CompleteCloud read more Monday, November 25, 2019 Four Reasons To Evaluate Your Current Email Security read more Thursday, November 7, 2019 8 Surprising Cybersecurity Statistics You Should Know read more Monday, October 21, 2019 7 Benefits of Managed Services read more Monday, September 23, 2019 Phone System Success Story: Bullitt County Health Department read more Monday, August 5, 2019 Employee Spotlight: Brenda Christy read more Wednesday, July 10, 2019 Why You Need the Email Threat Scanner read more Wednesday, May 29, 2019 3 Reasons to Migrate to Microsoft Windows 10 read more Monday, May 13, 2019 How to Enhance Security with Multi-Factor Authentication read more Monday, April 22, 2019 Prepare for Windows Server 2008 and SQL 2008 End of Life read more Wednesday, March 13, 2019 What You Should Know About The NoRelationship Phishing Attack read more Tuesday, March 5, 2019 Don’t Fall Victim to W-2 Scams! read more Monday, February 11, 2019 IT Success Story: Kentucky Elder Law read more Wednesday, January 30, 2019 Technology Trends in Transportation read more Wednesday, December 19, 2018 Total Email Protection with Barracuda read more Monday, October 22, 2018 End of Life for the NEC SV8100 read more Monday, October 1, 2018 Frightening Facts of Email Attacks – Importance of Advanced Email Security read more Tuesday, September 4, 2018 Advanced Secure Access for Remote and Mobile Workers read more Monday, July 16, 2018 Protect your Business from Spear-Phishing with AI read more Monday, July 2, 2018 Manufacturing & IT Compliance read more Wednesday, May 16, 2018 Unique IT Issues in Manufacturing read more Tuesday, April 24, 2018 GDPR – What You Need to Know read more Monday, March 19, 2018 Types of Cyber Security Threats & How to Prevent Them read more Monday, February 5, 2018 Employee Spotlight – Tom Myhal read more Wednesday, January 17, 2018 Spectre & Meltdown – How are you protected? read more Tuesday, December 5, 2017 What are your IT plans for 2018? read more Monday, November 20, 2017 The Layered Approach to Cloud Security read more Friday, October 27, 2017 New Ransomware Outbreak: Bad Rabbit read more Monday, October 16, 2017 Cloud Computing to Replace On-Premise Technology? read more Monday, August 21, 2017 Email Security read more Tuesday, July 25, 2017 Prevent Against Advanced Threats like Ransomware! read more Monday, June 19, 2017 Take your Phone System Mobile with NEC’s MLC read more Wednesday, May 17, 2017 Global WannaCry Ransomware Alert read more Tuesday, May 9, 2017 Can your users spot a phishing email? read more Monday, April 17, 2017 Boost Productivity while Protecting Corporate Data read more Tuesday, April 4, 2017 Five Key Strategies to Maximize Productivity read more Monday, March 20, 2017 3 Myths about the Cloud – Debunked! read more Monday, February 27, 2017 Exchange 2007 End of Life – Migrate to Office 365 read more Monday, February 20, 2017 The Dangers of Utilizing End of Life or End of Support Software read more Tuesday, January 24, 2017 Best Ways to Enhance your Network Security read more Monday, December 19, 2016 Preparing for the Move to the Cloud read more Monday, November 28, 2016 Kelley Beekeeping Chooses Centrality as Infrastructure Cabling Partner read more Tuesday, November 15, 2016 3 Reasons to Renew your Software Assurance read more Tuesday, November 1, 2016 Windows Server 2016 – What’s New? read more Monday, October 17, 2016 Employee Spotlight – Kyle Cheatham read more Tuesday, October 4, 2016 Education & Cloud Computing read more Monday, September 26, 2016 Prevent mobile malware with MaaS360! read more Tuesday, September 20, 2016 Failover Clustering for High Availability read more Monday, August 29, 2016 Does Your Business Need a Hardware Refresh? read more Monday, August 15, 2016 Claim your FREE Connectivity Audit Today! read more Monday, August 8, 2016 Reduce Travel Costs with the Collaboration Meeting Manager read more Monday, August 1, 2016 Customer Spotlight – Schiller Hardware read more Monday, July 25, 2016 Five Ways to Protect your Customers from Ransomware read more Monday, July 18, 2016 Not Just an Average Call Recording Solution… read more Tuesday, July 5, 2016 A (Complete) Cloud Solution for your Non-Profit! read more Tuesday, June 28, 2016 BYOD – Establishing the Future of Business read more Tuesday, June 21, 2016 Why Quality of Service for VoIP? read more Tuesday, June 14, 2016 Boost Productivity with Skype for Business read more Monday, June 6, 2016 Employee Spotlight: Andrew Murphy read more Tuesday, May 24, 2016 Webinar Recap – Enterprise Mobility Management read more Monday, May 16, 2016 The 3 P’s of Centrality’s Managed Services read more Tuesday, May 10, 2016 The Cloud – Now Customized for Engineering read more Monday, May 2, 2016 Univerge 3C Review – Innovate the Way You Work read more Monday, April 25, 2016 IT Success Story: Quantum Ink read more Monday, April 18, 2016 Unlock the Keys to Security and Productivity with MDM read more Monday, April 11, 2016 Mobile Workforce vs. Healthcare read more Monday, April 4, 2016 Prevent Ransomware From Corrupting Your Data read more Wednesday, March 30, 2016 Proactive vs. Reactive IT Webinar Recap read more Tuesday, March 29, 2016 Employee Spotlight: J.P. Hansen read more Tuesday, March 22, 2016 Utility Based Services Structure read more Tuesday, March 15, 2016 Communicate and Collaborate with 3C read more Monday, March 7, 2016 HIPPA and the Cloud read more Monday, February 29, 2016 Benefits of Upgrading to Windows 10 read more Monday, February 22, 2016 VoIP Technology 101 read more Tuesday, February 16, 2016 Managed Services Success Story: Louisville Tile read more Monday, February 8, 2016 Virtualization: 5 Key Benefits read more Monday, February 1, 2016 4 Notable Tech Trends on the Horizon read more Monday, January 25, 2016 Viruses: A good defense is the best offense read more Monday, January 18, 2016 Data Back Up & Recovery 101 read more Tuesday, January 12, 2016 Employee Spotlight: Dale Priddy read more Monday, January 4, 2016 Microsoft Office 365: Much more than email read more Monday, December 21, 2015 How Technology Can Ease the Stress of Holiday Travel read more Monday, December 14, 2015 2016 IT Budgeting: 5 Simple Ways to Trim Your Technology Expenses read more Monday, December 7, 2015 IT Success Story: Toyota of Louisville read more Monday, November 30, 2015 The Benefits of Updating Your Phone System read more Tuesday, November 24, 2015 Rethinking IT Webinar Recap read more Monday, November 23, 2015 Choosing a Side: Cloud or On-Premise read more Monday, November 16, 2015 Why Small Businesses Should Consider the Cloud read more Monday, November 9, 2015 Voicemail Still has a Voice read more Monday, November 2, 2015 Employee Spotlight: Liz Davis read more Wednesday, October 7, 2015 Top 5 SMB Technology Mistakes read more Wednesday, September 30, 2015 NEC’s UC Desktop Suite: Improve the Way You Work read more Wednesday, September 23, 2015 Rethink IT with Centrality read more Wednesday, September 16, 2015 CLOUD COMPUTING 101 read more Friday, September 11, 2015 NEC’s UT880 = Desktop Phone + Tablet read more Wednesday, September 9, 2015 New Name, Same Great Service read more Tuesday, August 4, 2015 How Your Business Can Benefit From Office 365 read more Wednesday, February 26, 2014 Introducing MiVoice Video Unit from Mitel read more Thursday, February 13, 2014 Managed Services: What is Worry Free IT? read more Wednesday, February 5, 2014 Benefits of Virtualization read more Wednesday, January 29, 2014 Mitel Unified Messaging read more Wednesday, January 22, 2014 NEC Recognized as Lowest Cost of Ownership read more Wednesday, January 15, 2014 Employee Spotlight: Steven Cox read more Tuesday, January 7, 2014 The Right Cloud Model for Your Business read more Wednesday, December 11, 2013 Has Office Efficiency Gone Out the Window? read more Tuesday, December 3, 2013 NEC Financial Services Deferred Payment Lease Promotion read more Sunday, December 1, 2013 Centrality Speaking at Microsoft Sponsored Event read more Tuesday, November 26, 2013 Free Compliance Analysis from Centrality read more Wednesday, November 13, 2013 Video: Introduction to NEC’s UC Desktop Product read more Wednesday, November 6, 2013 Mitel Customer Service read more Wednesday, October 16, 2013 Mitel Business Dashboard read more Wednesday, October 9, 2013 Data Loss – Are you Covered? read more Thursday, September 26, 2013 What is Interactive Intelligence? read more Tuesday, September 24, 2013 What You Didn’t Know You Could Get With VoIP read more Wednesday, September 18, 2013 What is Structured Data Cabling? read more Tuesday, September 10, 2013 Mitel Solutions for Mobile Workers read more Thursday, August 29, 2013 I.T. Solutions for Your Business read more Tuesday, August 27, 2013 How to Speed Up a Slow Computer read more Thursday, August 22, 2013 Employee Spotlight: Mike Tucker read more Tuesday, August 13, 2013 Understanding VoIP Terminology read more Tuesday, August 6, 2013 Planning Before You Experience an Outage read more
Wednesday, October 20, 2021 Get Enterprise-class protection for your business without the enterprise-class price tag read more
Wednesday, June 23, 2021 Anchor Offers Affordable CMMC v1.02 Compliance for Office, CAD, Video, and Voice Files read more
Wednesday, December 9, 2020 Proactive Cybersecurity Strategies For Small Businesses In 2021 read more
Wednesday, September 30, 2020 Five Cybersecurity Threats That Slip By Traditional Antivirus read more
Monday, October 1, 2018 Frightening Facts of Email Attacks – Importance of Advanced Email Security read more
Monday, November 28, 2016 Kelley Beekeeping Chooses Centrality as Infrastructure Cabling Partner read more
Monday, December 14, 2015 2016 IT Budgeting: 5 Simple Ways to Trim Your Technology Expenses read more