
How to Create a Firewall: Best Practices for Protecting Internal Networks
Creating a firewall can help protect your network from unauthorized access. ZAG provides best practices for …

Risk Management for the Supply Chain: Putting a Plan in Place, Part 2
Following a risk assessment to determine which vendors or suppliers pose a risk to your supply chain, management comes …

Risk Assessment in the Supply Chain: Why It Matters, Part 1
Assessing your supply chain risk is a critical first step in identifying potential deficits in your company’s ability …

UPS Run Time, Redundancy, and Outages, Part 3
Selecting the right uninterruptible power supply for your business should include considerations for run time, …

Surveillance Camera Breach Opens Up Discussions Around Third-party IoT Devices
Networked devices can be vectors for cybersecurity threats, making IoT security and vendor selection a priority. …

NOTICE: Microsoft Exchange Server Critical Vulnerabilities Patch Released Today
Microsoft released patches to the Exchange Server, including versions 2013, 2016, and 2019, in response to recent …

UPS Power and Load Management Factors, Part 2
Let ZAG walk you through the factors that need to be considered when selecting an uninterruptible power source, like …

Cyber Insurance: What You Should Know
Cyber insurance is more widely available given the number of breaches occurring daily. But what is it and how can it …

The Importance of an Uninterruptible Power Supply, Part 1
Having an uninterruptible power supply is essential across businesses in the supply chain to maintain your …

Best Practices for Wireless and BYOD
Wireless networks are essential for today’s businesses – no matter their size. But you must implement best …

The Skype is Falling: The Benefits of Adopting Microsoft Teams Early
Don’t wait for Skype to reach its end of life; the time is now to implement Microsoft Teams into your …

Technology and Agribusiness: Challenges IT Can Address
Agribusinesses face a number of unique challenges, many of which can be solved by using technology in a strategic way. …

The Produce News: The Ins and Outs of Protecting Our Food Supply Chain
Here are the modern-day challenges that the food supply chain faces, and how technology and managed IT services can …

Big Data and the Agricultural Industry: The Future of Farming
Using big data and intelligence-driven decision-making in the agricultural industry can transform productivity and …

ZAG Technical Services Named to Redmond Channel Partner Magazine RCP 350 List
ZAG was named by Redmond Channel Partner magazine to the RCP 350, a list of the top 350 Microsoft partners in the …

Microsoft Exchange Server Compromise: What You Should Know
Microsoft Exchange Server vulnerabilities result in additional security updates and tools to identify potential …

What to Look for in an IT Support and Help Desk Provider
You know you need IT support. But what should you look for when engaging with a third-party provider? We break it …

Password Managers: Protecting Your Personal Logins
Implementing additional password security with password management software can help your business protect its …

What is SASE? About Cisco’s Secure Access Service Edge
Interested in Cisco Secure Access Service Edge platform? Learn what it is and how it can benefit your …

International Women’s Day: Engaging Women in Tech
In honor of International Women's Day, ZAG is on board with the #ChooseToChallenge initiative to bring more women into …