Skip to content

Endsight Blog: Leadership, Productivity, Technology

These articles are published by Endsight, a local managed IT services and technical support firm with offices in Berkeley and Napa, serving the Greater San Francisco Bay Area and beyond.
We believe that your computer systems help your people and organization thrive. Because a great IT support experience goes deeper than best practices in technology, we also cover topics such as leadership and employee productivity.

A person works on a laptop. Superimposed over the user are images of a cloud and icons representing files and folders to be sent there as well as retrieved.

Worried You Don’t Have a Good Backup System for Your Data?

Built-in backup for Windows and IOS Are Not Enough to Protect You. Key Takeaways: With legacy systems, only 57% of..

A red warning with an exclamation point appears over the fingers of a person typing on a Mac laptop.

Are Macs More Secure? It Depends.

Macs have plenty of built-in security, but it is often not enough. Key Takeaways: Macs have a reputation for being more..

The image displays the front of a Microsoft office building with glass windows.

Is Microsoft 365 Security Sufficient for Your Business?

Are you wondering if Microsoft 365 has the effective security your business needs? In this age of threats, ransomware,..

The image displays a red envelope on a large steel hook skirting the top of a body of water.

Are Phishing & Ransomware Connected?

Time for phishing prevention? How phishing attacks have become the primary vector for ransomware delivery. Not quite..

The image displays a dark blue background with an assembled puzzle and the last piece hovering over its illuminated spot.

Box vs. Microsoft OneDrive: Which Is Better?

What cloud storage solutions got to do with your business? Box vs. Microsoft OneDrive Cloud-based file management and..

A person is touching a computer monitor, and waves of information flow to and from this person between a group of other people.

Maximizing Business Efficiency through Collaboration and Security

Share, communicate, and collaborate internally and externally – seamlessly. Key Takeaways: Eliminate errors and improve..