Blog

Unified communications and cloud migration

We’ve discussed the benefits of cloud migration in previous posts, as well as the considerations that you need to keep in mind before making the transition. Most businesses are familiar with the concept of migrating their email exchange servers and ...

Cloud Migration: The Ultimate Guide for Your Business

Every organization is looking to cloud services to help scale their business in one way or another. If your business is one of those who haven’t made the transition yet, then here are a few things to consider. The most ...

Backup vs. disaster recovery plans: do you know the difference?

Backup plans and disaster recovery plans are two terms that often seem to be used interchangeably in the IT space. But these are two entirely different parts of your company’s infrastructure, and it is critical that you know the difference ...

EDR vs. XDR: What You Need to Know

Cybersecurity initially began as an endpoint response system. Cybersecurity has become a reactive part of a company’s IT infrastructure. When a cyberattack happens, it becomes a race against time for IT professionals to try and mitigate the damage from this ...

What is SOC and what is SOC-as-a-Service?

For many IT professionals, the term “SOC” is used often when discussing IT infrastructure and services. But it’s not always clear whether the term SOC is widely understood, nor is it clear whether businesses realize how SOC and SOC-as-a-Service can ...

We’re Celebrating Our 30th Anniversary!

Happy birthday to us! We’re excited to celebrate a major milestone at TAG Solutions: 2021 is the 30th anniversary of when we began working with businesses in the New York Capital Region to achieve their information technology and telecommunication goals. ...

Jay’s Fireside Chats: Recognizing a Data Breach

Welcome to another episode of Jay’s Fireside Chats! In this video, Jay will walk you through everything you need to know in order to identify, respond, and recover from a data breach. Cybersecurity is one of the top concerns for ...

Detect, Dodge, and Defend Against Cyberattacks Webinar

Cybersecurity is an ever-evolving and complex world that you and your business need to navigate. In case you missed it, TAG Solutions presented a comprehensive webinar on common cyberattacks, how to recognize a cybersecurity breach, and what you can do ...

What is phishing and how can you avoid it?

You’ve probably heard the word “phishing” as it related to cybersecurity, but how familiar are you with what it actually is? There are a lot of ways that cybercriminals utilize phishing to gain access to your network and sensitive data, ...

Introducing Jay’s Fireside Chats!

At TAG Solutions, we’re excited to introduce a new video series called “Jay’s Fireside Chats,” starring our own Jay Yager, Business Development Representative. Every month, Jay will be discussing a different IT and cybersecurity topic that is essential for your ...

Contact

TAG SolutionsTAG Solutions Logo $$$

Latest Articles

Raising the Bar: Technology and Customer Expectations

Posted by tagsolutions On
Raising the Bar: Technology and Customer Expectations

Hidden Technology Barriers Crippling Small Businesses

Posted by tagsolutions On
Hidden Technology Barriers Crippling Small Businesses