2 min read
HTG Weekly Blog

3 min read
The Rise of Cloud Computing
.jpeg?width=30&name=0%20(7).jpeg)
The rise of cloud computing and cloud services has brought about tremendous new changes to how organizations handle their day-to-day operations and...

2 min read
Working From Home Causes Surge in Security Breaches
.jpeg?width=30&name=0%20(7).jpeg)
In the current working environment, remotely working from home has become second nature now. However, as a result of employees not being in the...

1 min read
Cybersecurity Awareness Month
.jpeg?width=30&name=0%20(7).jpeg)
The month of October is Cybersecurity Awareness Month, which means it is a great time to learn more about how you can better your stance on...

1 min read
Microsoft Vulnerability: Unpatched Domain Controllers Remain Vulnerable
.jpeg?width=30&name=0%20(7).jpeg)
With most businesses operating with a hybrid onsite & remote workforce, new vulnerabilities are putting critical data and systems at risk. Harbor...

2 min read
Ransomware & Other Cyberattacks: How Should SMBs Protect Themselves?
.jpeg?width=30&name=0%20(7).jpeg)
The threat environment for small and medium sized businesses (SMBs) is continuously changing and becoming more dangerous. Currently, the biggest...

1 min read
Laptops and BYOD in schools opens our students up to more than learning
.jpeg?width=30&name=0%20(7).jpeg)

1 min read
Introducing Harbor Technology
.jpeg?width=30&name=0%20(7).jpeg)
The Merriam-Webster dictionary defines HARBOR as a part of the ocean, a lake, etc., that is next to land and that is protected and deep enough to...