Endsight-Full-Screen.jpg

Leadership, Productivity, and IT Support

Enabling your people to do their best work and carry forth your organizational mission through articles on leadership, productivity, and technology

Your business technology should enable you to do your best work. This is possible when your technology aligns with your organizational mission, business model, and workflows. Our aim is that your computer systems empower your people and organization. We believe that a great IT support experience goes deeper than best practices in technology. That is why we speak to leadership and employee productivity as well.

Subscribe by

CRN Recognizes Endsight as a Top Security Provider in 2020

Endsight is proud to announce we have landed on CRN’s 2020 Managed Service Provider (MSP) 500 list in the Security 100 category, and we want to take this opportunity to thank our staff and clients for being a part of our journey. Cyber security does not stop at purchasing an anti-virus software or..

Read more

CCPA - What You Don’t Know Can Hurt You

For those that have not yet heard of the California Consumer Privacy Act (CCPA), this may come as a shock to you; not everyone is thrilled. This act is to put the power back into the consumer’s hands, which, in theory, is a great thing. The only problem – that this will affect big business very..

Read more

Windows 7 End of Life: Extended Security Updates

As you may know by now, a number of Microsoft applications and operating systems, including Windows 7 and Server 2008, will no longer be supported or patched after today, January 14, 2020. These operating systems are considered to be at end-of-life (EOL) operating systems. Over the past year, it..

Read more

Cybersecurity Threat: The Dunning Kruger Effect

The most overlooked cybersecurity threat is our own psychology. With network security policies, spam filters, and firewalls as your first line of defense, all that is left is our own irrational humanity. One psychological phenomenon, The Dunning Kruger Effect, is at the heart of most all..

Read more

How to Protect Yourself from a Social Engineering Attack

If you own a computer, cell phone, tablet, or another technology medium, odds are you have been a target for a social engineering attack. Simply put, social engineering occurs when an attacker strategically manipulates a person to give up their private information. These attackers are attempting to..

Read more

Endsight Awarded a Spot on CRN’s 2019 Security 100 List

 

Read more

These articles are written by the people of Endsight, a local managed IT services and technical support firm with offices in Berkeley and Napa, serving the Greater San Francisco Bay Area and beyond. Articles should be read as expert knowledge from individual contributors and not as Endsight's official stance on included topics.

Subscribe to get updates!