mytechpartners

Recent Posts

IT security tips for working remotely

Read More »

Security Alert: Exploit for Malicious Microsoft Office Attachments

You may have heard about the recently-announced security vulnerability that makes use of malicious code embedded in Microsoft Office documents. This
Read More »

PrintNightmare Vulnerability in Majority of Windows Devices

UPDATE – July 7 @ 11:45am: Microsoft has now published a patch to mitigate this vulnerability, and Mytech is already working on deploying it to our
Read More »

Decluttering & Converting “To Do” Emails with Outlook Tasks

Read More »

Mission - 20 Years, 20 Lessons

To celebrate our 20th year of business, Mytech is looking back on what we’ve learned over the past two decades.
Read More »

Taxes & Technology: Tax Tips To Plan Your IT Investments

Technology consumption is driving toward ‘As a Service’ models like Microsoft O365, Infrastructure as a Service (IaaS) like Amazon AWS & Microsoft
Read More »

Making a Difference in our Local Communities…

Season’s Greetings! As we get ready to say goodbye to 2018 and prepare to usher in 2019, we are reminded of all the blessings we have and continue to
Read More »

Hunger Free Colorado wins the Mytech Make A Difference Grant

On Wednesday, December 5th, 2018 Hunger Free Colorado was awarded the Mytech Partners Make A Difference Community Partner Grant worth up to
Read More »

4 Quadrants of Strategic Business IT Planning

Business and IT speak different languages. Because of this we find too many disconnects between executive initiatives, and IT execution. This results
Read More »

5 Steps to Drive Adoption with your Team! Panel Discussion

Most organizations leverage less than 50% of the capabilities of the technology they already own! This is often caused by the difficulty to define
Read More »

How Layered Security Keeps Attacks Out

High-profile malware attacks keep putting threat prevention best practices at the top of everyone’s technology list. Just last month there were two
Read More »

Why Security Awareness Training Matters

In the cat and mouse game of data security, the weakest player will always be the humans. According to the BakerHostetler 2017 Data Security Incident
Read More »