Endsight-Full-Screen.jpg

Endsight Blog: Leadership, Productivity, Technology

These articles are published by Endsight, a local managed IT services and technical support firm with offices in Berkeley and Napa, serving the Greater San Francisco Bay Area and beyond.

We believe that your computer systems help your people and organization thrive. Because a great IT support experience goes deeper than best practices in technology, we also cover topics such as leadership and employee productivity.

Subscribe by

3 Major Benefits Practice Management Systems Provide Law Firms

Current economic pressures pose significant challenges to law firms just as they do to many businesses around the country. A confluence of issues, including a tight labor market and rising costs, challenge firm leaders to grow revenue and profits without spending more money or adding staff.

Read more

Device Security Measures You Can Take for Your Organization

Mobile device security is a growing topic among businesses with employees who rely on mobile technology for company communications. In fact, many modern businesses expect employees to use their smartphones to access email, internal communications, and data. With trends such as the rise of remote..

Read more

Prepare Your Organization: The Essential Ingredient to Cybersecurity Success

Dwight Eisenhower is credited with saying “Plans are worthless, but planning is everything.” No cybersecurity plan, however thorough and supported by cutting-edge technology, is perfect. Especially when you factor in the free will of your employees and an ever-changing landscape of threats, there..

Read more

IT Asset Protection and The CIS Controls v8

If you are concerned about data security in your company, that’s a good thing. Protecting your company’s data, and other information that is in your organization’s care, is an essential responsibility in today’s environment. Data security, however, is just one piece of a comprehensive asset..

Read more

All Cybersecurity Plans Start With This Step

The starting point for an effective cybersecurity plan is so simple, it’s often overlooked. You must develop a comprehensive list of what you have, including the growing amount of data that resides outside of your company, before even worrying about a protection plan. Put more bluntly: You can’t..

Read more

IT Security for Employee Termination - Policies, Checklists, Templates

Severing a professional relationship is difficult, especially when it is an employee termination. No matter the situation, IT security cannot be ignored. Because of that, your IT support team needs to be a part of the discussion before the termination occurs.  Before you do something you will..

Read more

Subscribe to get updates!