In April 2025, VMware introduced significant alterations to their pricing structure. The changes have affected all customers and all products. Broadcom has responded to initial backlash, and the situation may continue to evolve. However,

Cloud Technology
4 Cloud Security Myths Busted By Credit Union Data Leak
An alarming story recently crossed my desk. Cybersecurity researcher Jeremiah Fowler discovered an unsecured cloud database containing 3 million records from thousands of credit unions across the United States. Fowler believed the database was managed by a company called CU

Blog
Top 5 Cybersecurity Solutions to Protect Your Businesses in 2024
Now more than ever, businesses need to implement cybersecurity solutions in order to protect their network from a cyberattack. Learn how and get tips for your end-users.

Company News
What You Need to Know About the ConnectWise ScreenConnect Critical Vulnerability
Corsica Technologies Clients Unaffected by this Vulnerability. ConnectWise, a leading provider of software for MSPs (managed IT service providers), has discovered a significant vulnerability in their ScreenConnect application. While Corsica Technologies does partner with ConnectWise, we do not use ConnectWise

AI
Where To Start With AI For Business
AI has taken the world by storm. It’s a big buzzword, but it’s also a real technology—and it’s doing some amazing things. That’s great for companies that are already using AI. But what if you’re not sure how to make

Cloud Technology
Cloud Repatriation 101: What’s Right For You?
Last updated October 21, 2025. Sometimes, the numbers don’t add up for cloud hosting. What seemed like a great idea is costing too much. Or maybe you’ve experienced one outage too many, as with the AWS outage that occurred on

Company News
Introducing Corsica’s EDI Data Integration Capabilities
Here at Corsica Technologies, we’re always expanding our capabilities so our customers can gain access to expertise in a diverse range of fields. From cybersecurity services to managed IT services and digital transformation, we cover it all. That’s why I’m

Cybersecurity
How To Test Your Employees With Phishing Emails
Last updated August 15, 2025. If you’ve ever received an “urgent” email that didn’t quite seem legitimate, then you’ve experienced phishing. Unfortunately, phishing emails represent a significant threat for organizations that are unprepared—particularly those that don’t have a cyber security

Cybersecurity
10 Essentials Of Cybersecurity Management
Last updated August 25, 2025. Cybersecurity management is essential in today’s threat landscape. Whether an organization fills these responsibilities in-house, or works with a cyber security managed services provider, you need leadership (plus a team of experts) keeping your company

Cybersecurity
4 Times Managed Detection And Response Saved The Day
Last updated August 27, 2025. You can’t respond to a cyber attack if you can’t even detect it. That’s the reason for MDR (managed detection and response). This service is an essential component in cyber security managed services. But what

CJIS
3 Essential CJIS Certifications for a Third-Party Vendor
Time, resources, and budget approval are just a few concerns we hear from agencies seeking to prepare for the next CJIS audit.

Digital Transformation
Top 6 Digital Transformation Projects For 2025
Last updated August 14, 2025. As 2025 picks up steam, we’re seeing new trends rise to prominence in the world of digital transformation. From AI to intranet, EDI to chatbots, opportunities abound for companies to get better at what they

Cybersecurity
10 Keys To Cybersecurity For Local Government
Local governments are in the crosshairs. As larger organizations harden their cybersecurity defenses, criminals are turning to softer targets. Recent incidents like the hacking of Hendersonville, NC, or the cyberattack on the Kansas state court system only reinforce a trend