Featured business it-cybersecurity

AI Acceptable Use Policy Template for Business

A year ago, AI policy was a 'nice to have' for most businesses. Today, it's a necessity. Employees are already using AI tools for work—whether you've...

centrexIT Team
Read Article

Latest Articles

From the centrexIT team

Showing 127 articles

Governance Without the Red Tape: AI Policies for SMBs
business it-cybersecurity

Governance Without the Red Tape: AI Policies for SMBs

I talked to a business owner last month who told me they'd decided to 'just ban AI' at their company. No ChatGPT. No Copilot. No AI tools of any kind.

5 min read
Under Armour Ransomware Breach — 72 Million Customers Exposed
business it-cybersecurity

Under Armour Ransomware Breach — 72 Million Customers Exposed

Under Armour has confirmed that a ransomware attack resulted in customer data appearing on dark web forums. The breach exposed approximately 72 million...

5 min read
Nike Data Breach Exposes 1.4TB of Internal Data
business data-breaches

Nike Data Breach Exposes 1.4TB of Internal Data

Another Major Brand Falls to Sustained Network Intrusion

4 min read
The 88% Problem
business it-cybersecurity

The 88% Problem

I came across a number recently that I haven't been able to shake.

4 min read
Malicious Chrome Extensions Stole Credentials from 2,300 Businesses
business it-cybersecurity

Malicious Chrome Extensions Stole Credentials from 2,300 Businesses

Five browser extensions were just removed from the Chrome Web Store after security researchers discovered they were stealing login credentials from...

5 min read
How to Evaluate If Your Organization Is Ready for Autonomous Systems
business it-cybersecurity

How to Evaluate If Your Organization Is Ready for Autonomous Systems

Businesses are asking 'should we adopt autonomous systems?' when the better question is 'are we ready to adopt autonomous systems?'

6 min read
How Uber Was Breached Through MFA Fatigue: A Security Wake-Up Call
business it-cybersecurity

How Uber Was Breached Through MFA Fatigue: A Security Wake-Up Call

September 2022. A ride-share giant's entire network compromised. Not through sophisticated malware or zero-day exploits—but because someone got tired of...

6 min read
centrexIT recognized as one of San Diego's Best Places to Work 2025
company-news culture

centrexIT recognized as one of San Diego's Best Places to Work 2025

We won the San Diego Business Journal's Best Places to Work award again. I'm proud of that. But I want to talk about what it actually represents—because it's...

5 min read
2025's Biggest Healthcare Data Breaches: Lessons for 2026
business healthcare

2025's Biggest Healthcare Data Breaches: Lessons for 2026

2025 did not break the record set by the Change Healthcare attack—that catastrophic breach affected 193 million people and remains the worst in healthcare...

4 min read
2025 Cybersecurity Year in Review: The Year Organizations Stopped Being Victims
business it-cybersecurity

2025 Cybersecurity Year in Review: The Year Organizations Stopped Being Victims

The Year Organizations Stopped Being Victims and Started Fighting Back

7 min read
What Does an Hour of Downtime Actually Cost?
business it-cybersecurity

What Does an Hour of Downtime Actually Cost?

Real Stories from Small Businesses That Learned the Hard Way

8 min read
When the Fire Took Everything: A Data Center Disaster That Destroyed Backups Too
business it-cybersecurity

When the Fire Took Everything: A Data Center Disaster That Destroyed Backups Too

It was just after midnight on March 10, 2021, in Strasbourg, France. A fire broke out at a facility operated by OVHcloud—Europe's largest cloud hosting...

8 min read
The Tide Is Turning: Ransomware Victims Are Fighting Back—and Winning
business it-cybersecurity

The Tide Is Turning: Ransomware Victims Are Fighting Back—and Winning

For years, the ransomware story has been relentlessly grim. Hospitals paralyzed. Schools shuttered. Businesses bankrupted. Every headline reinforced the...

6 min read
FBI Most Wanted: Inside the LockBit Ransomware Gang
business it-cybersecurity

FBI Most Wanted: Inside the LockBit Ransomware Gang

The FBI doesn't offer $10 million rewards for petty criminals. That bounty is reserved for terrorists, cartel leaders, and the most dangerous threats to...

5 min read
The 204-Day Problem: Why Attackers Live Inside Your Network for Months
business it-cybersecurity

The 204-Day Problem: Why Attackers Live Inside Your Network for Months

Imagine someone broke into your house. But instead of stealing something and leaving, they moved into your attic. They came and went through a back window...

5 min read
He Left the Company, Then Deleted 180 Servers.  Let's Talk Offboarding.
business it-cybersecurity

He Left the Company, Then Deleted 180 Servers. Let's Talk Offboarding.

Kandula Nagaraju was terminated in October 2022 for poor performance. His last day at NCS, a major IT services company in Singapore with over 13,000...

5 min read
Your Cyber Insurance Might Not Pay: 5 Reasons Claims Get Denied
business it-cybersecurity

Your Cyber Insurance Might Not Pay: 5 Reasons Claims Get Denied

They had cyber insurance. They'd paid their premiums for years. When ransomware finally hit, they filed a claim expecting to be covered.

5 min read
60 Credit Unions Went Dark The Sunday After Thanksgiving.  Let's Discuss
business finance

60 Credit Unions Went Dark The Sunday After Thanksgiving. Let's Discuss

November 26, 2023. The Sunday after Thanksgiving. Most Americans were recovering from turkey dinners and Black Friday shopping. At Mountain Valley Federal...

4 min read
The Early AM Alert No One Answered: A Christmas Day Ransomware Attack
business education

The Early AM Alert No One Answered: A Christmas Day Ransomware Attack

The week before Christmas, in the early hours of Christmas Day, a security system detected something unusual. A desktop device inside a company's network...

7 min read
The First 60 Minutes: What Happens When Your Network Is Breached
business education

The First 60 Minutes: What Happens When Your Network Is Breached

A ransomware attack doesn't announce itself with sirens. It starts with something small-a frozen screen, an error message, a file that won't open. By the...

4 min read
The Hospital IT Director Who Became a Cyber Security Hero
business culture

The Hospital IT Director Who Became a Cyber Security Hero

It was approaching midnight on a Sunday when the emergency room called. The charting system was down. What happened next would determine whether a 100-bed...

5 min read
The Night a Grad Student Broke the Internet (And Why Today We Celebrate National Computer Security Day)
business culture

The Night a Grad Student Broke the Internet (And Why Today We Celebrate National Computer Security Day)

On November 2, 1988, at 8:30 PM, a 23-year-old Cornell graduate student named Robert Tappan Morris had a simple question: How big is the internet?

4 min read
The ChatGPT Confession: How Your Employees Are Accidentally Leaking Proprietary Data to AI
business healthcare

The ChatGPT Confession: How Your Employees Are Accidentally Leaking Proprietary Data to AI

Your employees aren't trying to sabotage your company. They're just trying to be productive.

8 min read
The Video Call Requesting Money—That Wasn't Real
business healthcare

The Video Call Requesting Money—That Wasn't Real

A finance manager at a multinational company joins what appears to be a routine video conference. On screen: the CFO and several other executives. They...

10 min read
Insider Threats: The Security Risk Living Inside Your Organization
business it-cybersecurity

Insider Threats: The Security Risk Living Inside Your Organization

You've secured the perimeter. You've hardened your network. You've implemented sophisticated threat detection. You're protected.

6 min read
Supply Chain Security: Your Weakest Link Is Killing You
business it-cybersecurity

Supply Chain Security: Your Weakest Link Is Killing You

You've invested heavily in your own security. You have firewalls, endpoint protection, and a strong incident response team. You're protected.

4 min read
Beyond Backups: Building a Ransomware Recovery Plan That Actually Works
business it-cybersecurity

Beyond Backups: Building a Ransomware Recovery Plan That Actually Works

Ransomware attacks have evolved. They're no longer just about encryption and extortion. Modern ransomware campaigns combine encryption, data exfiltration,...

4 min read
Cyber Insurance: The Hidden Exclusions You're Missing
business it-cybersecurity

Cyber Insurance: The Hidden Exclusions You're Missing

Many business leaders make a critical assumption: cyber insurance will cover the costs of a breach. In reality, cyber insurance policies are filled with...

3 min read
Incident Response: What Separates a $50K Recovery from a $5M Disaster
business it-cybersecurity

Incident Response: What Separates a $50K Recovery from a $5M Disaster

When the alarm sounds, every minute counts. The difference between managing a breach and experiencing catastrophic operational collapse comes down to one...

3 min read
Can Your Leadership Team Answer These 3 Questions? Most Can't.
business it-cybersecurity

Can Your Leadership Team Answer These 3 Questions? Most Can't.

The moment a breach hits, it’s too late. The time to answer the toughest questions about your company’s security is before the inevitable, expensive, and...

3 min read
The Difference Between a Security Checklist and a Resilient Business
business it-cybersecurity

The Difference Between a Security Checklist and a Resilient Business

Look around your organization. Do you have a firewall? Antivirus software? Multi-factor authentication? If the answer is 'Yes,' you have a security...

3 min read
Your Brand Reputation is Your Most Valuable Asset. Are You Protecting It?
business it-cybersecurity

Your Brand Reputation is Your Most Valuable Asset. Are You Protecting It?

In the digital economy, your brand reputation is more fragile and more valuable than ever. It represents the collective trust of your customers,...

3 min read
The Hidden Deal-Breaker: How Poor Cybersecurity Can Kill Your M&A Strategy
it-cybersecurity

The Hidden Deal-Breaker: How Poor Cybersecurity Can Kill Your M&A Strategy

For any business leader considering a merger, acquisition, or eventual exit strategy, the focus is rightly on revenue synergy, market penetration, and key...

3 min read
Your CFO's Secret Weapon: Turning Cybersecurity from a Cost Center into a Strategic Investment
it-cybersecurity

Your CFO's Secret Weapon: Turning Cybersecurity from a Cost Center into a Strategic Investment

For decades, many organizations—and their CFOs—have viewed cybersecurity as a necessary evil: a pure cost center that consumes budget without producing...

3 min read
"Are We Secure?" - How to Answer the Board's Toughest Question with Confidence
business it-cybersecurity

"Are We Secure?" - How to Answer the Board's Toughest Question with Confidence

Every leader dreads this question from the board or a major investor. It's concise, high-stakes, and seemingly requires a simple 'Yes' or 'No.' The truth...

3 min read
The Fine Print That Can Cost You Millions: Is Your Cyber Insurance Policy a Safety Net or a Sinking Ship?
business it-cybersecurity

The Fine Print That Can Cost You Millions: Is Your Cyber Insurance Policy a Safety Net or a Sinking Ship?

Your cyber insurance policy is a critical component of your company’s financial strategy. You’ve invested in it to protect your valuation, safeguard...

4 min read
The Critical Question Every Leader Asks During a Breach
business it-cybersecurity

The Critical Question Every Leader Asks During a Breach

In the midst of a cybersecurity crisis, once the initial technical alarms have sounded, leadership is left with a single, defining question: 'Are we a...

3 min read
Your Online Information: Simple Steps to Keep It Safe and Private
it-cybersecurity security

Your Online Information: Simple Steps to Keep It Safe and Private

We all live much of our lives online, whether it's for work, staying in touch with friends, shopping, or just finding information. The internet makes many...

4 min read
Navigating the AI Frontier: Protecting Your Enterprise, Securing Your Leadership Legacy
it-cybersecurity security

Navigating the AI Frontier: Protecting Your Enterprise, Securing Your Leadership Legacy

Navigating the AI Frontier: Protecting Your Enterprise, Securing Your Leadership Legacy

6 min read
AI for Nonprofits: Protecting Donor Data, Securing Peace of Mind
it-cybersecurity non-profit

AI for Nonprofits: Protecting Donor Data, Securing Peace of Mind

AI for Nonprofits: Protecting Donor Data, Securing Peace of Mind

5 min read
Ransomware Protection for Business Leaders: Cloud & Hybrid Work
business it-cybersecurity

Ransomware Protection for Business Leaders: Cloud & Hybrid Work

As a Business Leader, your focus is on driving growth and ensuring long-term success. You also innovate constantly. Hybrid work models and cloud...

4 min read
Navigating the AI Frontier: How Smart Threats and Defenses Impact Your Operations
operations

Navigating the AI Frontier: How Smart Threats and Defenses Impact Your Operations

In manufacturing, logistics, and industrial operations, keeping things running is key. As an Operations Leader, you focus on efficiency, safety, and...

3 min read
The AI Imperative: Reshaping Cybersecurity Strategy for the Modern Strategist
it-cybersecurity

The AI Imperative: Reshaping Cybersecurity Strategy for the Modern Strategist

The rise of Artificial Intelligence isn't just a technological advancement; it's a fundamental shift, especially within the cybersecurity landscape. For...

4 min read
The Hidden Costs of Cyber Insecurity: Calculating the True ROI of Strategic Protection for Life Sciences
life-sciences

The Hidden Costs of Cyber Insecurity: Calculating the True ROI of Strategic Protection for Life Sciences

For many Life Sciences Executives, cybersecurity often appears as a necessary, yet burdensome, cost—a drain on resources with an elusive return. The...

4 min read
Beyond the Lab Bench: Why Cybersecurity Must Be Central to Every R&D Initiative
life-sciences

Beyond the Lab Bench: Why Cybersecurity Must Be Central to Every R&D Initiative

As a Life Sciences Executive, your core mission revolves around groundbreaking research and development. From novel drug compounds to advanced medical...

4 min read
Beyond Checkmarks: Achieving Proactive Security Readiness & Continuous  Improvement
life-sciences

Beyond Checkmarks: Achieving Proactive Security Readiness & Continuous Improvement

For life science executives, the concept of 'audit readiness' can often feel like a finite destination – a frantic scramble to check boxes before an...

3 min read
Is Your Life Science Firm Audit-Ready? A Comprehensive Cybersecurity Checklist
life-sciences

Is Your Life Science Firm Audit-Ready? A Comprehensive Cybersecurity Checklist

For life science executives, regulatory audits are a perennial fixture – a critical, often stressful, evaluation of your operations, data integrity, and...

4 min read
Understanding and ensuring compliance with GxP, 21 CFR Part 11, and GDPR  for life science firms
life-sciences

Understanding and ensuring compliance with GxP, 21 CFR Part 11, and GDPR for life science firms

For life science executives, the alphabet soup of regulatory compliance – GxP, 21 CFR Part 11, GDPR – can feel overwhelming. These aren't just abstract...

4 min read
Securing the R&D Frontier: Mitigating Risks from AI, IoT, and OT in Life Sciences
life-sciences

Securing the R&D Frontier: Mitigating Risks from AI, IoT, and OT in Life Sciences

The modern life science R&D environment is a vibrant, interconnected ecosystem. AI-powered algorithms analyze genomic data, IoT sensors monitor clinical...

4 min read
The Investor's Lens: Why Cybersecurity Assurance is Now a Must-Have for Funding Rounds
life-sciences

The Investor's Lens: Why Cybersecurity Assurance is Now a Must-Have for Funding Rounds

For life science executives navigating the complexities of funding rounds, securing capital has always been about demonstrating scientific prowess, market...

4 min read
Reframing cybersecurity from a cost center to a direct asset that impacts company valuation
life-sciences

Reframing cybersecurity from a cost center to a direct asset that impacts company valuation

For too long, cybersecurity has been viewed by many executives as a necessary evil – a significant cost center with little perceived direct return on...

3 min read
Beyond the Algorithm: Protecting Your AI's True Value in Life Sciences
life-sciences

Beyond the Algorithm: Protecting Your AI's True Value in Life Sciences

The promise of Artificial Intelligence in life sciences is immense, driving breakthroughs in drug discovery, diagnostics, and patient care. But the true...

3 min read
Beyond the Hype: Practical Strategies for Secure AI Data Pipelines
life-sciences

Beyond the Hype: Practical Strategies for Secure AI Data Pipelines

The promise of AI in life sciences is immense, driven by the quality and quantity of data fed into sophisticated models. Yet, for life science executives,...

3 min read
The transformative potential of AI in life sciences alongside its associated new cybersecurity risks
life-sciences

The transformative potential of AI in life sciences alongside its associated new cybersecurity risks

Artificial Intelligence (AI) is more than just a buzzword in life sciences; it’s a seismic shift, accelerating drug discovery, streamlining clinical...

3 min read
Is Your R&D Data Truly Safe? Common Vulnerabilities in Life Science Labs
life-sciences

Is Your R&D Data Truly Safe? Common Vulnerabilities in Life Science Labs

For life science executives, the lab is where the magic happens – where groundbreaking research transforms into life-saving therapies. Yet, paradoxically,...

3 min read
Beyond Compliance: Building a Holistic Cybersecurity Ecosystem for Life Sciences
life-sciences

Beyond Compliance: Building a Holistic Cybersecurity Ecosystem for Life Sciences

For life science executives, cybersecurity often conjures images of regulatory checkboxes and audit spreadsheets. While compliance with GxP, 21 CFR Part...

3 min read
The Silent Threat: How IP Theft Can Cripple Life Science Innovation
healthcare

The Silent Threat: How IP Theft Can Cripple Life Science Innovation

In the fast-paced world of life sciences, innovation is your most precious currency. Billions are invested in R&D, leading to groundbreaking discoveries...

3 min read
How to Build a Scalable Healthcare IT Strategy
cloud healthcare

How to Build a Scalable Healthcare IT Strategy

Scaling Healthcare IT: A Strategic Approach to Practice Growth

3 min read
Technology and HIPAA Violations: How to Stay Compliant in 2025
cloud healthcare

Technology and HIPAA Violations: How to Stay Compliant in 2025

Ensuring compliance with HIPAA regulations has never been more critical for healthcare organizations. With evolving technology and increasing cyber threats, ...

5 min read
How to Increase Cyber Resilience in Healthcare
cloud healthcare

How to Increase Cyber Resilience in Healthcare

How Can Healthcare IT Leaders Improve Cyber Resilience in 2025? Healthcare organizations are top targets for cyberattacks, with 725 breaches exposing 275M+ r...

4 min read
Does Your Practice Need Healthcare Managed IT Services?
cloud healthcare

Does Your Practice Need Healthcare Managed IT Services?

The healthcare industry is more reliant than ever on secure, reliable, and efficient technology. From electronic health records (EHR) to telemedicine solutio...

3 min read
Downtime in Healthcare: How to Prevent IT Disruptions
cloud healthcare

Downtime in Healthcare: How to Prevent IT Disruptions

The True Cost of IT Downtime in Healthcare IT downtime in healthcare isn’t just an inconvenience—it can lead to delayed treatments, data loss, compliance ris...

3 min read
The True Costs of IT Failures in Healthcare
cloud healthcare

The True Costs of IT Failures in Healthcare

In today’s healthcare industry, technology is the backbone of patient care, operational efficiency, and compliance. However, when IT systems fail, the conseq...

4 min read
The Power of People
culture featured

The Power of People

Note from the CEO: Our end-of-the-year post is a little bit different this year. Traditionally I take time at the end of the year to reflect on changes affec...

6 min read
centrexIT Leads Nation’s MSP Cloud Offerings with New cloudIT Private Cloud Powered by HPE GreenLake and Cisco
cloud news

centrexIT Leads Nation’s MSP Cloud Offerings with New cloudIT Private Cloud Powered by HPE GreenLake and Cisco

2-year development has yielded the fastest, most secure and energy efficient private cloud among MSPs, available only to centrexIT customers SAN DIEGO—August...

4 min read
centrexIT recognized as one of San Diego's Best Places to Work 2022
company-news culture

centrexIT recognized as one of San Diego's Best Places to Work 2022

2022 has been an exciting year so far! In addition to celebrating our 20th year anniversary this year, we're delighted to announce that 2022 is the ninth yea...

5 min read
Article: How Bad Could It Be? Three Key Steps For Preventing An SMB Cybersecurity Disaster
education featured

Article: How Bad Could It Be? Three Key Steps For Preventing An SMB Cybersecurity Disaster

This article first appeared on Forbes.com on June 2, 2022. Dylan Natter is the CEO and founder of centrexIT, a San Diego-based Managed Service Provider devot...

6 min read
centrexIT Appoints Katie McEvoy as Director of Quality to Build on Commitment  to Customer Success
company-news news

centrexIT Appoints Katie McEvoy as Director of Quality to Build on Commitment to Customer Success

Leading San Diego IT Services Provider Celebrates 20 Years in Business and Reports 10% Employee Growth to Date in 2022 SAN DIEGO—May 3, 2022— centrexIT, an i...

3 min read
Thank you for 20 Years of Service
culture

Thank you for 20 Years of Service

How do you say thank you for 20 years of service? For me it is with gratitude. I have the urge to pinch myself, for this moment seems unbelievable. 20 long y...

5 min read
2021: A Year to be Thankful For
culture

2021: A Year to be Thankful For

We have a lot to be thankful for this year! We officially went fully remote, we moved to a better office space, and we helped develop an exciting new IT mana...

4 min read
centrexIT Launches Next-Generation Platform to Streamline Information Technology Service Management
company-news news

centrexIT Launches Next-Generation Platform to Streamline Information Technology Service Management

Pzzle by centrexIT Marks the Industry's First Rapid Application Development Platform Designed with Multi-Client, Data-Sovereign Architecture SAN DIEGO – Nov....

3 min read
centrexIT recognized as one of San Diego's Best Places to Work 2021
company-news culture

centrexIT recognized as one of San Diego's Best Places to Work 2021

We're excited to announce that 2021 is the eighth year that centrexIT has been recognized as one of San Diego Business Journal's Best Places to Work! This ye...

4 min read
centrexIT Welcomes Joseph Turso as Director of Operations
company-news news

centrexIT Welcomes Joseph Turso as Director of Operations

Company Appoints Vice President of Technology and Director of Technology as Revenue Growth Rate Remains Strong SAN DIEGO – Sept 28, 2021 – centrexIT, an info...

3 min read
5 Top IT Security Habits
education security

5 Top IT Security Habits

We recently teamed up with PBO Advisory Group and Franklin | Soto to present the top best cyber practices to help protect your organization's valuable IT and...

8 min read
Technology Service Provider centrexIT and Enterprise Software Developer Dreamtsoft Form Strategic Partnership
company-news news

Technology Service Provider centrexIT and Enterprise Software Developer Dreamtsoft Form Strategic Partnership

Scheduled to launch in mid-2021, joint venture project will transform the way businesses manage information technology services SAN DIEGO – June 15, 2021 – c...

4 min read
Why You Need a Security Plan for Microsoft 365
education security

Why You Need a Security Plan for Microsoft 365

In our recent webinar with Veeam, we reviewed why you need a security plan for Microsoft 365. When Microsoft 365 was officially announced in 2017, it came as...

8 min read
Our New Work-from-anywhere Office
company-news culture

Our New Work-from-anywhere Office

We are excited to announce our new work-from-anywhere office! Last year, our team immediately transitioned to a full work-from-home model when the covid-19 s...

2 min read
Dylan Natter’s Proposed Forbes Articles
culture

Dylan Natter’s Proposed Forbes Articles

We were excited to publish our first Forbes article earlier this year and then we thought to ourselves...what article should centrexIT CEO Dylan Natter work ...

2 min read
Podcast: The Digital Nomad
education podcast

Podcast: The Digital Nomad

Darin Andersen and Merrin Muxlow from Seamless Podcast welcome special guest Sean Ernst, in this podcast episode "Smart Cities: Digital Nomad." “The missing ...

40 min read
Article: How MSPs Can Self-Regulate To Keep Businesses Safe
education featured

Article: How MSPs Can Self-Regulate To Keep Businesses Safe

In the historically unregulated MSP industry, self-regulation is key to keeping businesses safe. In this Forbes Technology article, Dylan Natter, CEO of cent...

1 min read
Podcast: The Digital Workspace
education podcast

Podcast: The Digital Workspace

Darin Andersen and Kim Hakim from Seamless Podcast welcome special guest Dylan Natter, in this podcast episode "Futurecon: The Digital Workspace." "It's been...

25 min read
Taking Care of Business in 2020
culture

Taking Care of Business in 2020

When we chose "Taking Care of Business" as part of our tagline, we weren't expecting the unique challenges of 2020. However, we here at centrexIT are blessed...

4 min read
Podcast: Work From Anywhere
cloud podcast

Podcast: Work From Anywhere

Darin Andersen and Kim Hakim from Seamless Podcast welcome special guest Sean Ernst, in this podcast episode "Futurecon: Work from Anywhere." "I packed my do...

38 min read
How To Secure Your Work-From-Home Users for Optimal Business Results
education security

How To Secure Your Work-From-Home Users for Optimal Business Results

Now that many businesses are comfortable with working remotely, it’s time to review how to secure work-from-home users in order to achieve optimal business r...

5 min read
Podcast: State of IoT in 2020
podcast security

Podcast: State of IoT in 2020

Darin Andersen and Daniel Obodovski from Seamless Podcast welcome special guests Sean Ernst, Darren Bennett and Tom Caldwell in this podcast "Smartcity Tech ...

1 min read
IT Security & Working from Home in a Covid-19 World
education security

IT Security & Working from Home in a Covid-19 World

There have been many new changes to IT security as businesses continue to navigate working from home in a covid-19 world. Industry experts Darren Bennett, To...

4 min read
centrexIT and Biocom Launch New IT Platform to Streamline Business Operations for California Life Science Companies
news

centrexIT and Biocom Launch New IT Platform to Streamline Business Operations for California Life Science Companies

IT Deal Desk eliminates the hassle of vetting and securing new technology providers SAN DIEGO – Oct. 6, 2020 – centrexIT, an information technology (IT) ser...

5 min read
Thrive with Microsoft 365 in the New Digital Age
education featured

Thrive with Microsoft 365 in the New Digital Age

In our September 2020 webinar, centrexIT and Klarinet Solutions reviewed how to use Microrosoft 365 to save money, get cyber-safe, and increase team performa...

2 min read
centrexIT’s Dylan Natter Accepted into Forbes Technology Council
news

centrexIT’s Dylan Natter Accepted into Forbes Technology Council

Forbes Technology Council is an Invitation-Only Community for World-Class CIOs, CTOs, and Technology Executives SAN DIEGO – Sept. 16, 2020 – Dylan Natter, CE...

3 min read
centrexIT recognized as one of San Diego Business Journal’s Best Places to Work 2020
news

centrexIT recognized as one of San Diego Business Journal’s Best Places to Work 2020

Top-100 company represents one of most engaged teams to work with in San Diego SAN DIEGO – Sept. 9, 2020 – centrexIT, an information technology (IT) services...

4 min read
Helping Working Wardrobes Help Others
culture

Helping Working Wardrobes Help Others

Photo: centrexIT and SynergEyes giving a “high five” to Working Wardrobes. It was a pleasure helping Working Wardrobes help others. 2020 has been a challengi...

4 min read
FBI Cybersecurity Resources and Covid-19 Recommendations
education security

FBI Cybersecurity Resources and Covid-19 Recommendations

Last week we were honored to team up with the FBI (in partnership with the Cyber Center of Excellence (CCOE)) and Biocom on behalf of our biotech heros. The ...

4 min read
centrexIT Bolsters Small and Midsize Business Cybersecurity Programs with Expansion of Cybersecurity Offering
news

centrexIT Bolsters Small and Midsize Business Cybersecurity Programs with Expansion of Cybersecurity Offering

The latest tools and services deliver enterprise grade security to small and midsize businesses nationwide, highlighting the company’s commitment to customer...

4 min read
centrexIT Promotes James Desson to President
company-news news

centrexIT Promotes James Desson to President

With over a decade of experience working for centrexIT, Desson will focus on scalability and professional development opportunities to enhance IT solutions a...

3 min read
Planning Your Business Continuity IT Strategy
education security

Planning Your Business Continuity IT Strategy

Have you spent time revising or planning your business continuity IT strategy yet? Business Continuity Planning is something you ideally do before a crisis o...

7 min read
San Diego Humane Society Virtual Walk for Animals
culture

San Diego Humane Society Virtual Walk for Animals

On May 2, 2020 our client, the San Diego Humane Society, is about to hold their biggest fundraising event of the year…virtually! We’re so excited about this ...

2 min read
Coronavirus Cyber Scam Information for San Diego Businesses
education

Coronavirus Cyber Scam Information for San Diego Businesses

Is your business prepared for a pandemic? First, read through our coronavirus cyber scam information for San Diego businesses. Then, find out how to keep you...

4 min read
How San Diego Businesses are Using IT to Prepare for the Coronavirus
education

How San Diego Businesses are Using IT to Prepare for the Coronavirus

Is your business prepared for a pandemic? First, read about how San Diego businesses are using IT to prepare for the coronavirus. Then, find out how to keep ...

7 min read
Top IT Tips for Working from Home (WFH)
education

Top IT Tips for Working from Home (WFH)

Is your business prepared for a pandemic? Find out how to keep your business productive and your team connected and learn about cybersecurity offerings for r...

9 min read
Sharing Joy with MAAC
culture

Sharing Joy with MAAC

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

3 min read
Why IT Leaders Should Focus On Desired Outcomes
education

Why IT Leaders Should Focus On Desired Outcomes

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

1 min read
San Diego Announces Deal With Verizon to Prep for 5G Wireless System
featured

San Diego Announces Deal With Verizon to Prep for 5G Wireless System

A multi-million dollar deal between San Diego and Verizon will lay the groundwork for 5G technology, the mayor announced Monday. San Diego Mayor Kevin Faulco...

1 min read
5G in San Diego Will Be A Game Changer For Local Businesses
featured

5G in San Diego Will Be A Game Changer For Local Businesses

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

4 min read
HATCH LA Bioscience Incubator Program | A Great Place For Biotech
featured life-sciences

HATCH LA Bioscience Incubator Program | A Great Place For Biotech

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

5 min read
What Apple’s New San Diego Campus Means For Life Sciences Companies
life-sciences

What Apple’s New San Diego Campus Means For Life Sciences Companies

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

4 min read
How To Choose the Best Life Sciences Managed Service Provider
education life-sciences

How To Choose the Best Life Sciences Managed Service Provider

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

5 min read
Managed Service Providers In San Diego Should Be Providing These 5 Things For Their Clients
featured

Managed Service Providers In San Diego Should Be Providing These 5 Things For Their Clients

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

4 min read
Why You Should Integrate Your IT Services and IT Security
education security

Why You Should Integrate Your IT Services and IT Security

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

4 min read
What Does a Virtual Chief Information Officer (VCIO) Do?
education

What Does a Virtual Chief Information Officer (VCIO) Do?

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

5 min read
15 Ways That Your Technology Can Give Your Company a Competitive Advantage
featured

15 Ways That Your Technology Can Give Your Company a Competitive Advantage

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

5 min read
Changing IT Providers? Here’s 10 Things You Should Get Before You Switch
education featured

Changing IT Providers? Here’s 10 Things You Should Get Before You Switch

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

3 min read
10 Questions To Ask When Selecting A New IT Services Provider
education featured

10 Questions To Ask When Selecting A New IT Services Provider

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

5 min read
How A Life Sciences Organization Should Choose An Outsourced IT Company
education featured

How A Life Sciences Organization Should Choose An Outsourced IT Company

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

4 min read
How Much Should You Be Spending on IT Support
featured

How Much Should You Be Spending on IT Support

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

5 min read
How to Choose a Legitimate Healthcare IT Support Provider
education life-sciences

How to Choose a Legitimate Healthcare IT Support Provider

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

5 min read
The San Diego Biocom IT Company That Specializes in Life Sciences
education life-sciences

The San Diego Biocom IT Company That Specializes in Life Sciences

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

3 min read
Why San Diego Life Sciences Companies Should Join Biocom
featured life-sciences

Why San Diego Life Sciences Companies Should Join Biocom

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

3 min read
5 Things Your IT Company Should Be Doing for You … But Probably Isn’t
featured

5 Things Your IT Company Should Be Doing for You … But Probably Isn’t

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

5 min read
How To Know When You’ve Outgrown Your IT Provider
education featured

How To Know When You’ve Outgrown Your IT Provider

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

5 min read
In-House vs. Outsourced IT: What Is Best for Your Business?
education

In-House vs. Outsourced IT: What Is Best for Your Business?

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

3 min read
The Complete Guide To Securing Your Company’s Network
security

The Complete Guide To Securing Your Company’s Network

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

3 min read
centrexIT Announces New CEO, New HQ and a Total Company Re-Focus on Culture and Customer Care
culture news

centrexIT Announces New CEO, New HQ and a Total Company Re-Focus on Culture and Customer Care

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

2 min read
centrexIT Partners with San Diego Humane Society’s Walk for Animals
culture

centrexIT Partners with San Diego Humane Society’s Walk for Animals

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

1 min read
Why a Company Should Migrate from On-Site Servers to Cloud Servers
cloud education

Why a Company Should Migrate from On-Site Servers to Cloud Servers

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

5 min read
How Cybersecurity Worked Before 1970
education security

How Cybersecurity Worked Before 1970

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

3 min read
What is a CASB & When Should You Use One?
cloud education

What is a CASB & When Should You Use One?

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

3 min read
Why centrexIT Did a Mannequin Challenge
culture

Why centrexIT Did a Mannequin Challenge

IT companies and managed services providers are notorious for thrusting “their solutions” on to a client even in situations that might not be in the best int...

2 min read