Today, work happens from everywhere. That means that workers need access to their tools from anywhere – and that’s where Windows 365 Cloud PC comes in. At Exigent, we’ve been implementing and supporting Microsoft technologies for decades. We’re excited to provide Windows 365 Cloud PC as a secure and efficient solution that can grow with […]

Embarking on some IT documentation?  Not sure what IT documentation you need to record?  Perhaps we can help. Computer networks are some of the most complex systems deployed within your organization. That complexity, coupled with notoriously poor documentation can lead to unacceptable levels of downtime, poorly performing applications, easily compromised security and unplanned expenses. Our […]

Let’s get this out of the way, first: If you don’t consider yourself particularly tech savvy, you should probably call for tech help before deploying Windows 365 Cloud PCs. For all of the simplicity of running Windows 365 Cloud PC from the user side, the reality is that, from the admin side, getting set up […]

Windows 365 Cloud PC is awesome technology for remote work. It standardizes apps and computing experiences across devices. It’s very scalable. It’s remarkably efficient. It’s highly secure. But none of that matters if you don’t actually know how to set it up and use it. Don’t worry – in this article, we’ll cover how your […]

If you run a small-to-mid-sized business, you’ve inevitably had to adopt remote work protocols over the past year. Congratulations on making it this far! Now, a quick question: How has it been? Has your business thrived with your employees out of the office? Have there been unforeseen challenges in going remote? Do you have a […]

Imagine that your employee’s personal computer has been hacked. They only ever used one password for personal accounts, and one of the online stores they shop at has been breached. Their password was made public on the dark web, and cybercriminals have used it to hack into their laptop. Now, imagine that your employee is […]

Securing administrative access to your Sonicwall from the WAN There are several reasons you may want to enable remote management on the public-facing (WAN) interface of a Sonicwall firewall: Remote assistance is needed with the initial configuration Virtual Private Networking (VPN) has not yet been configured You require temporary remote polling or administration For security […]

Storage is one of the most important factors that laptop users take into consideration when purchasing a laptop. Although many laptop manufacturers and retailers advertise some features to entice you to buy a new laptop, most laptops have had the same operating power (CPU, GPU, etc.). What differentiates many laptops is their hard drive because […]

Did you know that 50% of all cyber attacks carried out today target small businesses? In fact, CNBC reported in April 2017 that 14 million businesses had been attacked in the last year alone. Your business could be next. But it doesn’t have to be! The truth is that there are steps every small business […]

Today’s businesses need to worry about cybersecurity more than ever before. With threats at all angles, it’s essential that your business has Ban updated IT setup and the latest security software. Of all the points of entry, email might be one of the most vulnerable. The simple nature of email has made it a trusted […]