About
About Lloyd
Leadership
Company Culture
Industries We Service
Client Success Stories
Client Case Stories
Solutions
Education Resources
Contact
Contact Us
Client Support
Careers
About
About Lloyd
Meet Our Team
Company Culture
Industries We Service
Client Success Stories
Solutions
Education Resources
Contact
Contact Us
Client Support
Careers
The Lloyd Voice
A look inside the minds of Lloydians.
Security
(48)
Cyber Attacks
(45)
Technology
(35)
Cyber Security
(32)
IT Services
(32)
IT Management
(27)
Business Continuity
(23)
Remote work
(21)
Cybersecurity
(20)
Microsoft
(20)
Collaboration
(17)
industry events
(17)
Business Success
(15)
Cyber Resilience
(13)
Leadership
(12)
Partner
(12)
Disaster Recovery
(11)
Remote
(11)
Digital Transformation
(10)
IT Strategy
(10)
Risk Management
(10)
Consulting
(9)
Data Breach
(9)
Community
(8)
Ransomware
(8)
social media
(8)
Endpoint Detection & Response
(7)
Strategy
(6)
IT Governance
(5)
Password Security
(5)
Phishing
(5)
Scams
(5)
tech
(5)
Artifical Intelligence
(4)
Data Loss
(4)
Events
(4)
Office 365
(4)
Vulnerability Assessment
(4)
news
(4)
Cyber Criminals
(3)
Cyber Insurance
(3)
EDR
(3)
Holiday
(3)
Hybrid
(3)
Insider
(3)
Managed IT
(3)
Penetration Test
(3)
Team
(3)
patching
(3)
Antivirus
(2)
Cloud Transformation
(2)
Hybrid IT
(2)
Kaseya
(2)
Lloyd Values
(2)
Phishing Testing
(2)
Security Newsletter
(2)
SharePoint
(2)
Tech Tips
(2)
Training
(2)
Windows 10
(2)
Windows 11
(2)
World News
(2)
financial services
(2)
AI
(1)
Association of Legal Administrator’s (ALA)
(1)
Client Strategy
(1)
Cloud Migration
(1)
Conference
(1)
Dispatch
(1)
Diversity
(1)
ILTA
(1)
ILTACON
(1)
IT Downtime
(1)
Inclusion
(1)
Keith Hernandez
(1)
Legal
(1)
Malware
(1)
Networking
(1)
Selfie Contest
(1)
Tax Scams
(1)
Tax Season
(1)
Test
(1)
Virus
(1)
Weather
(1)
iManage
(1)
partners
(1)
see all
Securing Your Bottom Line with Cybersecurity Investments
By
Jaden Ambrose
| Feb 29, 2024 9:42:57 AM
Read More
How an IT Steering Committee Shapes IT Governance
By
Jaden Ambrose
| Feb 1, 2024 11:56:55 AM
Read More
The Importance of Vendor Due Diligence
By
Jaden Ambrose
| Jan 18, 2024 9:42:21 AM
Read More
Building a Robust Cybersecurity Posture in 2024
By
Jaden Ambrose
| Jan 4, 2024 10:03:16 AM
Read More
Phishing 101: Recognizing, Avoiding, and Responding
By
Jaden Ambrose
| Dec 21, 2023 1:40:56 PM
Read More
How MSPs and Internal IT Drive Success in a Hybrid IT Model
By
Jaden Ambrose
| Dec 7, 2023 11:26:17 AM
Read More
The Critical Role of Cybersecurity & Risk Management
By
Jaden Ambrose
| Nov 21, 2023 12:00:48 PM
Read More
6 Cybersecurity & Risk Management Essentials for SMBs
By
Bill Goldin
| Oct 25, 2023 9:37:27 AM
Read More
Securing Your Business' Future: The Importance of Cyber Insurance
By
Jaden Ambrose
| Oct 12, 2023 9:44:16 AM
Read More
11 Advantages of Using the Outlook App Rather than Apple Mail
By
Jaden Ambrose
| Sep 28, 2023 9:21:55 AM
Read More
Securing Tomorrow – Investing in Comprehensive IT & Cybersecurity Solutions
By
Jaden Ambrose
| Sep 20, 2023 9:37:59 AM
Read More
Enhancing Your Cybersecurity with EDR: A Step Beyond Antivirus
By
Jaden Ambrose
| Aug 30, 2023 10:04:09 AM
Read More
Bridging the Security Gap with Cybersecurity Awareness Training
By
Jaden Ambrose
| Aug 16, 2023 10:06:23 AM
Read More
The Power of Managed Detection & Response (MDR)
By
Jaden Ambrose
| Jul 20, 2023 10:17:03 AM
Read More
The Human Element of Cybersecurity
By
Bill Goldin
| Jun 21, 2023 10:08:52 AM
Read More
Prioritizing IT Governance and Risk Management for CIOs and IT Leaders
By
Jaden Ambrose
| Jun 7, 2023 12:26:05 PM
Read More
The True Cost of IT Downtime for SMBs
By
Jaden Ambrose
| May 24, 2023 10:22:22 AM
Read More
How to Protect Your Computer from Malware and Viruses
By
Jaden Ambrose
| May 10, 2023 11:00:44 AM
Read More
Tech Tips to Streamline Your Workday and Boost Productivity
By
Kevin Zhu
| Apr 26, 2023 11:10:50 AM
Read More
Why Data Backup is Essential: Understanding the Risks of Data Loss
By
Jaden Ambrose
| Apr 17, 2023 10:58:54 AM
Read More
Cybersecurity for SMBs: Challenges Facing Small to Mid-Size Businesses
By
Jaden Ambrose
| Mar 29, 2023 11:19:59 AM
Read More
Women in IT: 5 Tips for Starting Out in Tech
By
Mary Pickel
| Mar 16, 2023 9:25:47 AM
Read More
6 Common Tax Scams and How to Avoid Them
By
Jaden Ambrose
| Feb 23, 2023 9:52:04 AM
Read More
Cybersecurity Tips for International Travel
By
Jaden Ambrose
| Feb 2, 2023 10:36:20 AM
Read More
How A Managed Services Provider Can Help Your Business Succeed in 2023
By
Jaden Ambrose
| Jan 5, 2023 10:01:29 AM
Read More
6 Scams to Watch Out for This Holiday Season
By
Jaden Ambrose
| Dec 21, 2022 11:08:14 AM
Read More
4 Steps to Establish Your IT Strategy
By
Jaden Ambrose
| Dec 7, 2022 10:29:58 AM
Read More
5 Core Elements of a Cybersecurity Framework
By
Jaden Ambrose
| Nov 23, 2022 11:04:24 AM
Read More
Cybersecurity Risks are Heightening in the Financial Industry
By
Jaden Ambrose
| Nov 9, 2022 10:29:02 AM
Read More
Cyber Resilience: Is Your Business Really Secure?
By
Jaden Ambrose
| Oct 27, 2022 11:13:11 AM
Read More
Cyber Insurance Essentials for Today's Market
By
Jaden Ambrose
| Oct 12, 2022 10:41:06 AM
Read More
5 Ways Your Employees Can Support Your Cybersecurity Culture
By
Jaden Ambrose
| Sep 28, 2022 11:03:33 AM
Read More
Cyber Criminals Work 24/7 - How Can Your Business Keep Up?
By
Jaden Ambrose
| Sep 14, 2022 10:14:36 AM
Read More
Cyberattacks Continue to Increase: 6 Ways to Protect Your Business
By
Jaden Ambrose
| Aug 31, 2022 9:23:42 AM
Read More
4 Key Signs of a Phishing Attack
By
Jaden Ambrose
| Aug 17, 2022 10:49:17 AM
Read More
What is EDR? | Endpoint Detection & Response
By
Jaden Ambrose
| Aug 3, 2022 11:20:21 AM
Read More
6 Reasons to Partner with an MSP
By
Jaden Ambrose
| Jul 20, 2022 10:48:14 AM
Read More
5 Benefits of Cloud Transformation
By
Jaden Ambrose
| Jul 6, 2022 9:18:16 AM
Read More
Password Security Tips & Best Practices
By
Jaden Ambrose
| Jun 22, 2022 10:49:41 AM
Read More
Vulnerability Testing vs. Penetration Testing
By
Jaden Ambrose
| Jun 8, 2022 9:42:50 AM
Read More
Your Guide to Disaster Recovery and Business Continuity
By
Jaden Ambrose
| May 25, 2022 10:56:45 AM
Read More
Implementing AI into Your Cybersecurity Process
By
Jaden Ambrose
| May 11, 2022 10:53:59 AM
Read More
The Power of Integrating Successful Digital Transformation
By
Maria Sadek
| May 5, 2022 10:41:32 AM
Read More
4 Tips to Protect Yourself from Scams During Tax Season
By
Maria Sadek
| Apr 1, 2022 9:36:56 AM
Read More
Preparing Your Business for a Large-Scale Cyberattack
By
Maria Sadek
| Mar 9, 2022 10:08:17 AM
Read More
Executing a Strategic Model for a Digital Transformation
By
Maria Sadek
| Feb 17, 2022 10:30:13 AM
Read More
Technology Trends Stemming from the Pandemic Shaping the Future of Business
By
Maria Sadek
| Feb 3, 2022 10:07:16 AM
Read More
5 Tech Habits That Will Benefit Your Personal Life
By
Maria Sadek
| Jan 20, 2022 10:15:00 AM
Read More
Mobile Carriers are Shutting Down Their 3G Networks – What This Means for You
By
Maria Sadek
| Dec 28, 2021 10:00:00 AM
Read More
Digital Trends: The Tech Gifts Every Remote Worker Will Want
By
Maria Sadek
| Dec 16, 2021 10:15:00 AM
Read More
It’s the Most Fraudulent Time of the Year
By
Maria Sadek
| Nov 18, 2021 11:01:24 AM
Read More
Cybersecurity Awareness Month: Spotting 4 Misconceptions
By
Maria Sadek
| Oct 29, 2021 11:19:02 AM
Read More
Tech Essentials to Boost Your Work from Home Experience
By
Maria Sadek
| Sep 29, 2021 10:00:00 AM
Read More
Microsoft Warns of Widespread Phishing Attacks
By
Maria Sadek
| Sep 9, 2021 11:00:00 AM
Read More
Five Key Developments Impacting Your Data Security
By
Maria Sadek
| Aug 6, 2021 9:35:19 AM
Read More
Say Goodbye to Windows 10 – Introducing Windows 11
By
Maria Sadek
| Jul 22, 2021 10:15:00 AM
Read More
Kaseya Working Around the Clock to Combat the Cybercriminals: Everything You Need to Know About the Recent Attack
By
Maria Sadek
| Jul 9, 2021 12:42:55 PM
Read More
Effectively Understanding SharePoint & Its Best Practices
By
Maria Sadek
| Jun 23, 2021 1:08:48 PM
Read More
Top 4 Strategic IT Service Trends Since the Pandemic
By
Maria Sadek
| Jun 9, 2021 10:46:22 AM
Read More
Securing a Hybrid Workforce From Cyber Threats
By
Maria Sadek
| May 27, 2021 11:08:47 AM
Read More
CRN’s Hot Technology Trends to Watch In 2021
By
Maria Sadek
| May 13, 2021 10:18:49 AM
Read More
Safeguarding Your Social Media Accounts for Business
By
Maria Sadek
| Apr 29, 2021 12:00:01 PM
Read More
MSPs for Financial Services – a Strategic & Regulatory Perspective
By
Maria Sadek
| Apr 15, 2021 11:30:00 AM
Read More
The Pursuit of Connectedness: Building a Relationship with Your Community in a Virtual World
By
Maria Sadek
| Mar 24, 2021 11:00:00 AM
Read More
Microsoft Conquering the New Normal Through the CMS Approach: Collaboration, Mobility, & Security
By
Maria Sadek
| Mar 10, 2021 11:00:00 AM
Read More
Strategically Aligning Technology and Business
By
Maria Sadek
| Feb 24, 2021 11:00:00 AM
Read More
Three Major IT Challenges Businesses Should Prepare for in 2021
By
Maria Sadek
| Feb 10, 2021 10:55:37 AM
Read More
The Lloyd Group Celebrates 25 Years: A Letter from our CEO
By
Adam L. Eiseman
| Jun 12, 2020 2:20:16 PM
Read More
Collaboration in the Workplace: Microsoft Teams
By
Lloyd Group
| Feb 2, 2018 4:29:32 PM
Read More
4 Scenarios for When to Consider a Hybrid IT Model
By
Mary Babiarz
| Oct 10, 2017 10:59:15 AM
Read More
ILTACON 2017 | Evolution of the Modern Law Firm
By
Mike Diaz
| Sep 14, 2017 3:14:37 PM
Read More
Security Update | Vol 5: SIEM, World Security News, and Patching
By
Bill Goldin
| Sep 6, 2017 7:00:00 AM
Read More
Cisco Ingram Fly Higher Accelerate Community | June Event Recap
By
Mary Babiarz
| Aug 18, 2017 9:41:12 AM
Read More
Two-Factor Authentication – Why We Recommend It (And Use It Ourselves)
By
Mike Diaz
| Aug 2, 2017 11:32:26 AM
Read More
Security Update | Vol 4: Cyber Security Framework, Security News, and Patching Updates
By
Bill Goldin
| Jul 20, 2017 9:10:26 AM
Read More
Microsoft Office 365: What is it, and should I be using it?
By
Andrew Machado
| Jul 18, 2017 11:12:33 AM
Read More
How Networking Has Made Me a Better IT Consultant
By
Daniel E. Krutoy
| Jul 13, 2017 3:45:37 PM
Read More
Our Time Spent with Keith Hernandez and the ALA
By
Scott Peritzman
| Jul 5, 2017 9:09:49 AM
Read More
Security Update | Vol 3
By
Bill Goldin
| Jun 7, 2017 10:00:09 AM
Read More
Kaseya Conference 2017 Highlights: Patching & Two-Factor Authentication
By
Bill Goldin
| May 26, 2017 10:00:55 AM
Read More
The Team Approach: From Sports to Work Life
By
Lloyd Group
| May 19, 2017 11:05:29 AM
Read More
Lloyd Security Update | Vol 2
By
Bill Goldin
| May 11, 2017 12:04:58 PM
Read More
Lloyd Does InfoSec World 2017
By
Bill Goldin
| Apr 28, 2017 10:45:00 AM
Read More
Investing in the Idea of Artificial Intelligence
By
Lloyd Group
| Apr 13, 2017 7:00:00 AM
Read More
Our Dispatch Team is Building Client Relationships through Selfies
By
Lloyd Group
| Apr 6, 2017 1:07:52 PM
Read More
Lloyd Security Update | March 2017
By
Bill Goldin
| Mar 30, 2017 7:00:00 AM
Read More
A Look at our iManage Training Experience
By
Steven Au Yeung
| Mar 28, 2017 3:35:00 PM
Read More
“Is This Email Safe?”: How To Avoid Phishing Scams
By
Bill Goldin
| Mar 20, 2017 4:12:18 PM
Read More
Proactive Measures for Dreadful Weather
By
Mary Babiarz
| Mar 13, 2017 4:37:44 PM
Read More
Lloyd does Legaltech
By
Mary Babiarz
| Mar 7, 2017 12:13:40 PM
Read More