<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Grassroots Blog</title>
    <link>https://blog.grassrootsit.com.au</link>
    <description />
    <language>en-us</language>
    <pubDate>Tue, 18 Feb 2020 01:33:34 GMT</pubDate>
    <dc:date>2020-02-18T01:33:34Z</dc:date>
    <dc:language>en-us</dc:language>
    <item>
      <title>Why We Fell In Love with Teams</title>
      <link>https://blog.grassrootsit.com.au/why-we-fell-in-love-with-teams</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.grassrootsit.com.au/why-we-fell-in-love-with-teams" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.grassrootsit.com.au/hubfs/Why%20I%20fell%20in%20love%20with%20Teams%20%282%29.png" alt="Why We Fell In Love with Teams" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;So many communications apps and collaboration tools are readily available these days, with more being developed daily. With an abundant amount of options to choose from, how do you pick out one that is perfect for your business needs? If you’re looking for the best option to choose as your organisation’s collaboration channel and wondering if Microsoft Teams is really worth the hype, here's the lowdown based on our experience with Teams.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.grassrootsit.com.au/why-we-fell-in-love-with-teams" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.grassrootsit.com.au/hubfs/Why%20I%20fell%20in%20love%20with%20Teams%20%282%29.png" alt="Why We Fell In Love with Teams" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;So many communications apps and collaboration tools are readily available these days, with more being developed daily. With an abundant amount of options to choose from, how do you pick out one that is perfect for your business needs? If you’re looking for the best option to choose as your organisation’s collaboration channel and wondering if Microsoft Teams is really worth the hype, here's the lowdown based on our experience with Teams.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1785234&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.grassrootsit.com.au%2Fwhy-we-fell-in-love-with-teams&amp;amp;bu=https%253A%252F%252Fblog.grassrootsit.com.au&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Office 365</category>
      <category>office365</category>
      <category>Business</category>
      <category>collaboration</category>
      <category>teams</category>
      <category>microsoft teams</category>
      <category>Microsoft 365</category>
      <pubDate>Wed, 12 Feb 2020 23:30:32 GMT</pubDate>
      <author>marketing@grassrootsit.com.au (MC Pascasio)</author>
      <guid>https://blog.grassrootsit.com.au/why-we-fell-in-love-with-teams</guid>
      <dc:date>2020-02-12T23:30:32Z</dc:date>
    </item>
    <item>
      <title>5 Tips for Successfully Outsourcing IT Support</title>
      <link>https://blog.grassrootsit.com.au/5-tips-for-outsourcing-it-support</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.grassrootsit.com.au/5-tips-for-outsourcing-it-support" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.grassrootsit.com.au/hubfs/5%20Tips%20for%20IT%20Outsourcing.png" alt="5 Tips for IT Outsourcing" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;&lt;span&gt;A &lt;a href="https://blog.grassrootsit.com.au/it-managed-services-provider-need-service-model-type"&gt;Managed Service Provider (MSP)&lt;/a&gt; can help your business stay up-to-date with the latest technology and remain competitive in today’s challenging business environment. What's more, it can do all this while cutting your in-house IT support costs and freeing up your technical staff for mission critical tasks.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.grassrootsit.com.au/5-tips-for-outsourcing-it-support" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.grassrootsit.com.au/hubfs/5%20Tips%20for%20IT%20Outsourcing.png" alt="5 Tips for IT Outsourcing" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;&lt;span&gt;A &lt;a href="https://blog.grassrootsit.com.au/it-managed-services-provider-need-service-model-type"&gt;Managed Service Provider (MSP)&lt;/a&gt; can help your business stay up-to-date with the latest technology and remain competitive in today’s challenging business environment. What's more, it can do all this while cutting your in-house IT support costs and freeing up your technical staff for mission critical tasks.&lt;/span&gt;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1785234&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.grassrootsit.com.au%2F5-tips-for-outsourcing-it-support&amp;amp;bu=https%253A%252F%252Fblog.grassrootsit.com.au&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>outsource</category>
      <category>support</category>
      <category>Tech Tips</category>
      <category>tips</category>
      <category>Business</category>
      <category>IT strategy</category>
      <category>IT Partner</category>
      <category>MSP</category>
      <category>IT service provider</category>
      <category>IT Support</category>
      <category>Outsourcing</category>
      <category>IT Services</category>
      <pubDate>Sun, 24 Nov 2019 22:00:00 GMT</pubDate>
      <author>Ben@grassrootsit.com.au (Ben Love)</author>
      <guid>https://blog.grassrootsit.com.au/5-tips-for-outsourcing-it-support</guid>
      <dc:date>2019-11-24T22:00:00Z</dc:date>
    </item>
    <item>
      <title>The Essential Eight Cybersecurity Framework</title>
      <link>https://blog.grassrootsit.com.au/essential-eight-cybersecurity-framework</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.grassrootsit.com.au/essential-eight-cybersecurity-framework" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.grassrootsit.com.au/hubfs/Essential%20Eight.png" alt="Essential Eight" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;&lt;a href="https://www.grassrootsit.com.au/cybersecurity/"&gt;Cyber-security&lt;/a&gt; threats and data breaches are becoming increasingly rampant, sophisticated and difficult to mitigate. &lt;a href="https://www.information-age.com/targeted-cyber-attacks-rise-sonicwall-123481185/"&gt;Statistics from recent studies&lt;/a&gt; show that instances of malware attacks, data breaches, and intrusion attempts are on the rise. The challenge of ensuring cybersecurity is a global issue affecting many industries and organisations.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.grassrootsit.com.au/essential-eight-cybersecurity-framework" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.grassrootsit.com.au/hubfs/Essential%20Eight.png" alt="Essential Eight" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;&lt;a href="https://www.grassrootsit.com.au/cybersecurity/"&gt;Cyber-security&lt;/a&gt; threats and data breaches are becoming increasingly rampant, sophisticated and difficult to mitigate. &lt;a href="https://www.information-age.com/targeted-cyber-attacks-rise-sonicwall-123481185/"&gt;Statistics from recent studies&lt;/a&gt; show that instances of malware attacks, data breaches, and intrusion attempts are on the rise. The challenge of ensuring cybersecurity is a global issue affecting many industries and organisations.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1785234&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.grassrootsit.com.au%2Fessential-eight-cybersecurity-framework&amp;amp;bu=https%253A%252F%252Fblog.grassrootsit.com.au&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Business</category>
      <category>Cyber Security</category>
      <category>IT strategy</category>
      <pubDate>Mon, 04 Nov 2019 05:00:37 GMT</pubDate>
      <author>Ben@grassrootsit.com.au (Ben Love)</author>
      <guid>https://blog.grassrootsit.com.au/essential-eight-cybersecurity-framework</guid>
      <dc:date>2019-11-04T05:00:37Z</dc:date>
    </item>
    <item>
      <title>What is Microsoft Enterprise Management and Security?</title>
      <link>https://blog.grassrootsit.com.au/microsoft-enterprise-management-security</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.grassrootsit.com.au/microsoft-enterprise-management-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.grassrootsit.com.au/hubfs/Microsoft%20EMS.png" alt="Microsoft EMS" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;With so many Microsoft products out there, many small business owners are left wondering how to choose the best Microsoft package for their unique business needs. &lt;a href="https://www.grassrootsit.com.au/microsoft-365-and-office-365/"&gt;Office 365 and Microsoft 365&lt;/a&gt; appear similar in many ways, but there are a few significant differences between them that may affect which product you choose for your organisation.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.grassrootsit.com.au/microsoft-enterprise-management-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.grassrootsit.com.au/hubfs/Microsoft%20EMS.png" alt="Microsoft EMS" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;With so many Microsoft products out there, many small business owners are left wondering how to choose the best Microsoft package for their unique business needs. &lt;a href="https://www.grassrootsit.com.au/microsoft-365-and-office-365/"&gt;Office 365 and Microsoft 365&lt;/a&gt; appear similar in many ways, but there are a few significant differences between them that may affect which product you choose for your organisation.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1785234&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.grassrootsit.com.au%2Fmicrosoft-enterprise-management-security&amp;amp;bu=https%253A%252F%252Fblog.grassrootsit.com.au&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Office 365</category>
      <category>office365</category>
      <category>Business</category>
      <category>microsoft</category>
      <category>Microsoft 365</category>
      <pubDate>Mon, 04 Nov 2019 04:59:54 GMT</pubDate>
      <author>Ben@grassrootsit.com.au (Ben Love)</author>
      <guid>https://blog.grassrootsit.com.au/microsoft-enterprise-management-security</guid>
      <dc:date>2019-11-04T04:59:54Z</dc:date>
    </item>
    <item>
      <title>Top 9 Ways to Secure Office 365 and Microsoft 365</title>
      <link>https://blog.grassrootsit.com.au/top-ways-secure-office365-microsoft365</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.grassrootsit.com.au/top-ways-secure-office365-microsoft365" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.grassrootsit.com.au/hubfs/9%20ways%20to%20secure%20O365%20&amp;amp;%20M365.png" alt="9 ways to secure O365 &amp;amp; M365" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Microsoft &lt;a href="https://www.grassrootsit.com.au/microsoft-365-and-office-365/"&gt;Office 365&lt;/a&gt; has many security features and capabilities built in, however with a few simple steps you can greatly increase your &lt;a href="https://www.grassrootsit.com.au/cybersecurity/"&gt;cyber-security &lt;/a&gt;stance with some easy changes to system configuration and business practices.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.grassrootsit.com.au/top-ways-secure-office365-microsoft365" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.grassrootsit.com.au/hubfs/9%20ways%20to%20secure%20O365%20&amp;amp;%20M365.png" alt="9 ways to secure O365 &amp;amp; M365" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Microsoft &lt;a href="https://www.grassrootsit.com.au/microsoft-365-and-office-365/"&gt;Office 365&lt;/a&gt; has many security features and capabilities built in, however with a few simple steps you can greatly increase your &lt;a href="https://www.grassrootsit.com.au/cybersecurity/"&gt;cyber-security &lt;/a&gt;stance with some easy changes to system configuration and business practices.&amp;nbsp;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1785234&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.grassrootsit.com.au%2Ftop-ways-secure-office365-microsoft365&amp;amp;bu=https%253A%252F%252Fblog.grassrootsit.com.au&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Office 365</category>
      <category>Cyber Security</category>
      <category>microsoft</category>
      <category>security</category>
      <category>phishing</category>
      <pubDate>Mon, 04 Nov 2019 04:58:50 GMT</pubDate>
      <author>Ben@grassrootsit.com.au (Ben Love)</author>
      <guid>https://blog.grassrootsit.com.au/top-ways-secure-office365-microsoft365</guid>
      <dc:date>2019-11-04T04:58:50Z</dc:date>
    </item>
    <item>
      <title>Human Error: The Weak Link in Your Cybersecurity</title>
      <link>https://blog.grassrootsit.com.au/weak-link-in-cybersecurity</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.grassrootsit.com.au/weak-link-in-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.grassrootsit.com.au/hubfs/True%20Cause%20of%20Data%20Breaches-1.png" alt="True Cause of Data Breaches-1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;&lt;span class="TextRun SCXW212754236 BCX0"&gt;&lt;span class="NormalTextRun SCXW212754236 BCX0"&gt;2019 is becoming a remarkably prominent year for data breaches. Recent &lt;a href="https://pages.riskbasedsecurity.com/2019-midyear-data-breach-quickview-report"&gt;reports&lt;/a&gt; by Risk Based Security shows a huge increase in data breach incidents of more than 50% compared to the same time last year. This could be blamed on more sophisticated cyberattacks or even on the ‘Internet of Things’ as we’re now all so connected within a huge web of network that we are more vulnerable to cyberattacks. But still, data suggests that the number one contributor to the rising number of data breach incidents is, of course – human error.&lt;/span&gt;&lt;/span&gt;&lt;span class="EOP SCXW212754236 BCX0"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.grassrootsit.com.au/weak-link-in-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.grassrootsit.com.au/hubfs/True%20Cause%20of%20Data%20Breaches-1.png" alt="True Cause of Data Breaches-1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;&lt;span class="TextRun SCXW212754236 BCX0"&gt;&lt;span class="NormalTextRun SCXW212754236 BCX0"&gt;2019 is becoming a remarkably prominent year for data breaches. Recent &lt;a href="https://pages.riskbasedsecurity.com/2019-midyear-data-breach-quickview-report"&gt;reports&lt;/a&gt; by Risk Based Security shows a huge increase in data breach incidents of more than 50% compared to the same time last year. This could be blamed on more sophisticated cyberattacks or even on the ‘Internet of Things’ as we’re now all so connected within a huge web of network that we are more vulnerable to cyberattacks. But still, data suggests that the number one contributor to the rising number of data breach incidents is, of course – human error.&lt;/span&gt;&lt;/span&gt;&lt;span class="EOP SCXW212754236 BCX0"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1785234&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.grassrootsit.com.au%2Fweak-link-in-cybersecurity&amp;amp;bu=https%253A%252F%252Fblog.grassrootsit.com.au&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Business</category>
      <category>Cyber Security</category>
      <category>security</category>
      <category>Tech Tips</category>
      <category>phishing</category>
      <category>Firewall</category>
      <pubDate>Sun, 20 Oct 2019 21:00:00 GMT</pubDate>
      <author>marketing@grassrootsit.com.au (MC Pascasio)</author>
      <guid>https://blog.grassrootsit.com.au/weak-link-in-cybersecurity</guid>
      <dc:date>2019-10-20T21:00:00Z</dc:date>
    </item>
    <item>
      <title>[Webinar Replay] 2019 Top 5 Cybersecurity Practices for your Business</title>
      <link>https://blog.grassrootsit.com.au/cybersecurity-webinar-replay</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.grassrootsit.com.au/cybersecurity-webinar-replay" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.grassrootsit.com.au/hubfs/Cybersecurity%20Webinar%20Featured%20Image.png" alt="Cybersecurity Webinar Featured Image" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Cybersecurity is a burning hot topic in the industry today. It is the practice of ensuring that your business is protected from malicious actors and criminal attempts of possible cyber breaches.&lt;/p&gt; 
&lt;p&gt;In a live webinar, Ben Love touches on this very important topic to list down and provide an in-depth discussion about some of the most effective ways to keep your business cybersecure. Here’s a little recap of the quick yet valuable webinar on the Top 5 Cybersecurity Practice for your Business.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.grassrootsit.com.au/cybersecurity-webinar-replay" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.grassrootsit.com.au/hubfs/Cybersecurity%20Webinar%20Featured%20Image.png" alt="Cybersecurity Webinar Featured Image" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Cybersecurity is a burning hot topic in the industry today. It is the practice of ensuring that your business is protected from malicious actors and criminal attempts of possible cyber breaches.&lt;/p&gt; 
&lt;p&gt;In a live webinar, Ben Love touches on this very important topic to list down and provide an in-depth discussion about some of the most effective ways to keep your business cybersecure. Here’s a little recap of the quick yet valuable webinar on the Top 5 Cybersecurity Practice for your Business.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1785234&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.grassrootsit.com.au%2Fcybersecurity-webinar-replay&amp;amp;bu=https%253A%252F%252Fblog.grassrootsit.com.au&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Business</category>
      <category>Cyber Security</category>
      <category>IT</category>
      <category>cyberinsurance</category>
      <pubDate>Fri, 13 Sep 2019 00:54:08 GMT</pubDate>
      <author>marketing@grassrootsit.com.au (MC Pascasio)</author>
      <guid>https://blog.grassrootsit.com.au/cybersecurity-webinar-replay</guid>
      <dc:date>2019-09-13T00:54:08Z</dc:date>
    </item>
    <item>
      <title>CyberInsurance: Why You Need to Talk to Your Broker Today</title>
      <link>https://blog.grassrootsit.com.au/cyberinsurance</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.grassrootsit.com.au/cyberinsurance" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.grassrootsit.com.au/hubfs/Cyber%20Insurance-1.png" alt="Cyber Insurance-1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;In 2014, five hundred million user accounts perished under a massive cyber attack. Personal data such as the users’ full names, birth dates, phone numbers and passwords were breached. And in March 2018, 32 million accounts were affected after another hacking. All these huge figures of data breach attacks were aimed at one of the world’s biggest companies --Yahoo.&lt;/p&gt; 
&lt;p&gt;You know Yahoo, I know Yahoo, we all know Yahoo. It’s a huge name in the social media and email realm, so surely such a big enterprise is giving their all to protect their data (which is OUR data)? Yahoo probably spends billions of dollars on cybersecurity and yet, they are still vulnerable to cyber attacks. In late 2017, &lt;a href="https://www.cnet.com/news/yahoo-announces-all-3-billion-accounts-hit-in-2013-breach/"&gt;Yahoo admitted&lt;/a&gt; that all of their three billion user accounts had been hacked in previous years. This speaks volume about cyber insecurity today.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.grassrootsit.com.au/cyberinsurance" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.grassrootsit.com.au/hubfs/Cyber%20Insurance-1.png" alt="Cyber Insurance-1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;In 2014, five hundred million user accounts perished under a massive cyber attack. Personal data such as the users’ full names, birth dates, phone numbers and passwords were breached. And in March 2018, 32 million accounts were affected after another hacking. All these huge figures of data breach attacks were aimed at one of the world’s biggest companies --Yahoo.&lt;/p&gt; 
&lt;p&gt;You know Yahoo, I know Yahoo, we all know Yahoo. It’s a huge name in the social media and email realm, so surely such a big enterprise is giving their all to protect their data (which is OUR data)? Yahoo probably spends billions of dollars on cybersecurity and yet, they are still vulnerable to cyber attacks. In late 2017, &lt;a href="https://www.cnet.com/news/yahoo-announces-all-3-billion-accounts-hit-in-2013-breach/"&gt;Yahoo admitted&lt;/a&gt; that all of their three billion user accounts had been hacked in previous years. This speaks volume about cyber insecurity today.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1785234&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.grassrootsit.com.au%2Fcyberinsurance&amp;amp;bu=https%253A%252F%252Fblog.grassrootsit.com.au&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Business Continuity</category>
      <category>Business</category>
      <category>Cyber Security</category>
      <category>cyberinsurance</category>
      <pubDate>Tue, 27 Aug 2019 04:48:27 GMT</pubDate>
      <author>marketing@grassrootsit.com.au (MC Pascasio)</author>
      <guid>https://blog.grassrootsit.com.au/cyberinsurance</guid>
      <dc:date>2019-08-27T04:48:27Z</dc:date>
    </item>
    <item>
      <title>Why an Intelligent Firewall is Critical For Your Network Security</title>
      <link>https://blog.grassrootsit.com.au/why-intelligent-firewall-is-critical-for-network-security</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.grassrootsit.com.au/why-intelligent-firewall-is-critical-for-network-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.grassrootsit.com.au/hubfs/Intelligent%20Firewall_1.png" alt="Intelligent Firewall_1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;&lt;span class="TextRun SCXW85106443 BCX0"&gt;&lt;span class="NormalTextRun SCXW85106443 BCX0"&gt;In years gone by,&lt;/span&gt;&lt;/span&gt;&lt;span class="TextRun SCXW85106443 BCX0"&gt;&lt;span class="NormalTextRun SCXW85106443 BCX0"&gt;&lt;span&gt; we may have thought the chance of experiencing a &lt;a href="https://www.grassrootsit.com.au/cybersecurity-for-business/"&gt;cybersecurity&lt;/a&gt; breach was pretty low but, these days&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="TextRun SCXW85106443 BCX0"&gt;&lt;span class="NormalTextRun SCXW85106443 BCX0"&gt;, the more aware business leaders tal&lt;/span&gt;&lt;/span&gt;&lt;span class="TextRun SCXW85106443 BCX0"&gt;&lt;span class="NormalTextRun SCXW85106443 BCX0"&gt;k not about the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="TextRun SCXW85106443 BCX0"&gt;&lt;span class="NormalTextRun SCXW85106443 BCX0"&gt;possibility&lt;/span&gt;&lt;/span&gt;&lt;span class="TextRun SCXW85106443 BCX0"&gt;&lt;span class="NormalTextRun SCXW85106443 BCX0"&gt;&amp;nbsp;but of&lt;/span&gt;&lt;/span&gt;&lt;span class="TextRun SCXW85106443 BCX0"&gt;&lt;span class="NormalTextRun SCXW85106443 BCX0"&gt;&lt;strong&gt;when &lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="TextRun SCXW85106443 BCX0"&gt;&lt;span class="NormalTextRun SCXW85106443 BCX0"&gt;a cyberattack will happen. So let's talk about&lt;/span&gt;&lt;/span&gt;&lt;span class="TextRun SCXW85106443 BCX0"&gt;&lt;span class="NormalTextRun SCXW85106443 BCX0"&gt; how can we take preventative action to defend our computer systems and keep the risk of an attack to a minimum.&lt;/span&gt;&lt;/span&gt;&lt;span class="EOP SCXW85106443 BCX0"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.grassrootsit.com.au/why-intelligent-firewall-is-critical-for-network-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.grassrootsit.com.au/hubfs/Intelligent%20Firewall_1.png" alt="Intelligent Firewall_1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;&lt;span class="TextRun SCXW85106443 BCX0"&gt;&lt;span class="NormalTextRun SCXW85106443 BCX0"&gt;In years gone by,&lt;/span&gt;&lt;/span&gt;&lt;span class="TextRun SCXW85106443 BCX0"&gt;&lt;span class="NormalTextRun SCXW85106443 BCX0"&gt;&lt;span&gt; we may have thought the chance of experiencing a &lt;a href="https://www.grassrootsit.com.au/cybersecurity-for-business/"&gt;cybersecurity&lt;/a&gt; breach was pretty low but, these days&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="TextRun SCXW85106443 BCX0"&gt;&lt;span class="NormalTextRun SCXW85106443 BCX0"&gt;, the more aware business leaders tal&lt;/span&gt;&lt;/span&gt;&lt;span class="TextRun SCXW85106443 BCX0"&gt;&lt;span class="NormalTextRun SCXW85106443 BCX0"&gt;k not about the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="TextRun SCXW85106443 BCX0"&gt;&lt;span class="NormalTextRun SCXW85106443 BCX0"&gt;possibility&lt;/span&gt;&lt;/span&gt;&lt;span class="TextRun SCXW85106443 BCX0"&gt;&lt;span class="NormalTextRun SCXW85106443 BCX0"&gt;&amp;nbsp;but of&lt;/span&gt;&lt;/span&gt;&lt;span class="TextRun SCXW85106443 BCX0"&gt;&lt;span class="NormalTextRun SCXW85106443 BCX0"&gt;&lt;strong&gt;when &lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="TextRun SCXW85106443 BCX0"&gt;&lt;span class="NormalTextRun SCXW85106443 BCX0"&gt;a cyberattack will happen. So let's talk about&lt;/span&gt;&lt;/span&gt;&lt;span class="TextRun SCXW85106443 BCX0"&gt;&lt;span class="NormalTextRun SCXW85106443 BCX0"&gt; how can we take preventative action to defend our computer systems and keep the risk of an attack to a minimum.&lt;/span&gt;&lt;/span&gt;&lt;span class="EOP SCXW85106443 BCX0"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1785234&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.grassrootsit.com.au%2Fwhy-intelligent-firewall-is-critical-for-network-security&amp;amp;bu=https%253A%252F%252Fblog.grassrootsit.com.au&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Business Continuity</category>
      <category>Business</category>
      <category>Cyber Security</category>
      <category>security</category>
      <category>Firewall</category>
      <pubDate>Thu, 08 Aug 2019 04:22:58 GMT</pubDate>
      <author>marketing@grassrootsit.com.au (MC Pascasio)</author>
      <guid>https://blog.grassrootsit.com.au/why-intelligent-firewall-is-critical-for-network-security</guid>
      <dc:date>2019-08-08T04:22:58Z</dc:date>
    </item>
    <item>
      <title>How to Choose the Right Managed Service Provider for your Business</title>
      <link>https://blog.grassrootsit.com.au/how-to-choose-msp</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.grassrootsit.com.au/how-to-choose-msp" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.grassrootsit.com.au/hubfs/What%20is%20an%20MSP%20%281%29-1.png" alt="What is an MSP (1)-1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;&lt;span&gt;Whether your business is growing and you’re ready to level up your IT to include a dedicated IT provider, or you’re looking for a new IT provider to partner with, you need to consider working with a Managed Service Provider (MSP) . So let's talk about what to look for in an MSP and how to find the right partner for your business.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.grassrootsit.com.au/how-to-choose-msp" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.grassrootsit.com.au/hubfs/What%20is%20an%20MSP%20%281%29-1.png" alt="What is an MSP (1)-1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;&lt;span&gt;Whether your business is growing and you’re ready to level up your IT to include a dedicated IT provider, or you’re looking for a new IT provider to partner with, you need to consider working with a Managed Service Provider (MSP) . So let's talk about what to look for in an MSP and how to find the right partner for your business.&lt;/span&gt;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1785234&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.grassrootsit.com.au%2Fhow-to-choose-msp&amp;amp;bu=https%253A%252F%252Fblog.grassrootsit.com.au&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>managed services</category>
      <category>IT Partner</category>
      <category>MSP</category>
      <category>IT service provider</category>
      <pubDate>Tue, 23 Jul 2019 04:54:01 GMT</pubDate>
      <author>annie@grassrootsit.com.au (Annie Love)</author>
      <guid>https://blog.grassrootsit.com.au/how-to-choose-msp</guid>
      <dc:date>2019-07-23T04:54:01Z</dc:date>
    </item>
  </channel>
</rss>
