{"id":30791,"date":"2019-06-17T18:17:21","date_gmt":"2019-06-17T18:17:21","guid":{"rendered":"https:\/\/thelogicgroup.com\/?page_id=30791"},"modified":"2022-03-14T11:14:25","modified_gmt":"2022-03-14T16:14:25","slug":"blog","status":"publish","type":"page","link":"https:\/\/thelogicgroup.com\/about\/blog\/","title":{"rendered":"Blogs"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jkjmqted-fccf9e5406fe4b3a90fa1154a9f890a1\">\n.avia-section.av-jkjmqted-fccf9e5406fe4b3a90fa1154a9f890a1 .av-parallax .av-parallax-inner{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/02\/Perspective-view-of-server-room-with-icons-floating-around.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-jkjmqted-fccf9e5406fe4b3a90fa1154a9f890a1 .av-section-color-overlay{\nopacity:0.5;\nbackground-color:#000000;\n}\n#top .avia-section.av-jkjmqted-fccf9e5406fe4b3a90fa1154a9f890a1 .scroll-down-link{\ncolor:#ffffff;\n}\n#top .avia-section.av-jkjmqted-fccf9e5406fe4b3a90fa1154a9f890a1 .scroll-down-link.avia-svg-icon svg:first-child{\nstroke:#ffffff;\nfill:#ffffff;\n}\n<\/style>\n<div id='amg-diagonal-overlay'  class='avia-section av-jkjmqted-fccf9e5406fe4b3a90fa1154a9f890a1 header_color avia-section-large avia-no-shadow  avia-builder-el-0  el_before_av_blog  avia-builder-el-first  avia-full-stretch av-parallax-section avia-bg-style-parallax av-section-color-overlay-active av-minimum-height av-minimum-height-50 av-height-50  container_wrap fullsize'  data-section-bg-repeat='stretch' data-av_minimum_height_pc='50' data-av_min_height_opt='50'><div class='av-parallax' data-avia-parallax-ratio='0.3' ><div class='av-parallax-inner header_color avia-full-stretch'><\/div><\/div><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><a href='#next-section' title='' class='scroll-down-link av-custom-scroll-down-color avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='down-open-mini' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-1' aria-describedby='av-svg-desc-1' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-1'>Scroll to next section<\/title>\n<desc id='av-svg-desc-1'>Scroll to next section<\/desc>\n<path d=\"M12.96 12.16q0.704-0.832 1.536 0 0.832 0.704 0 1.536l-6.272 6.144q-0.704 0.704-1.536 0l-6.272-6.144q-0.832-0.832 0-1.536 0.768-0.768 1.6 0l5.44 4.992z\"><\/path>\n<\/svg><\/a><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-30791'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1xzgnjg-1902772b399c44fce51bfbf75088774d\">\n.flex_column.av-1xzgnjg-1902772b399c44fce51bfbf75088774d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-1xzgnjg-1902772b399c44fce51bfbf75088774d av_one_full  avia-builder-el-1  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l0b100gl-c50c38f07d90aea6767bbede507f650b\">\n#top .av-special-heading.av-l0b100gl-c50c38f07d90aea6767bbede507f650b{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\n}\nbody .av-special-heading.av-l0b100gl-c50c38f07d90aea6767bbede507f650b .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l0b100gl-c50c38f07d90aea6767bbede507f650b .av-subheading{\nfont-size:23px;\n}\n<\/style>\n<div  class='av-special-heading av-l0b100gl-c50c38f07d90aea6767bbede507f650b av-special-heading-h1 blockquote modern-quote modern-centered  avia-builder-el-2  el_before_av_textblock  avia-builder-el-first  av-linked-heading'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Blogs<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-juk5nwr2-687373c22bf83ee6c218f49fd331d369\">\n#top .av_textblock_section.av-juk5nwr2-687373c22bf83ee6c218f49fd331d369 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-juk5nwr2-687373c22bf83ee6c218f49fd331d369 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock amg-subtext av_inherit_color'  itemprop=\"text\" ><p style=\"text-align: center;\">Business IT is complicated. Use our blog to learn more about how IT affects your business. You can also use our blog to learn about emerging IT trends and news.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kayc1itg-552d8aa378f146bf7012bc78a287eec0\">\n#top .hr.hr-invisible.av-kayc1itg-552d8aa378f146bf7012bc78a287eec0{\nheight:35px;\n}\n<\/style>\n<div  class='hr av-kayc1itg-552d8aa378f146bf7012bc78a287eec0 hr-invisible  avia-builder-el-4  el_after_av_textblock  avia-builder-el-last '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p><\/div>\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><\/div><div id='after_section_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-30791'><div class='entry-content-wrapper clearfix'>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-grid-active avia-content-slider1 avia-content-slider-even  avia-builder-el-5  el_after_av_section  avia-builder-el-no-sibling  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-32226 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_half first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/you-need-regular-it-assessments\/' data-rel='slide-1' class='slide-image' title='Why You Need To Perform Regular IT Assessments'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/05\/The-Benefits-of-Co-Managed-IT-Services-495x400.jpg\" class=\"wp-image-32202 avia-img-lazy-loading-not-32202 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/05\/The-Benefits-of-Co-Managed-IT-Services-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/05\/The-Benefits-of-Co-Managed-IT-Services-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Why You Need To Perform Regular IT Assessments\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/you-need-regular-it-assessments\/' title='Why You Need To Perform Regular IT Assessments'>Why You Need To Perform Regular IT Assessments<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/managed-it\/\" rel=\"tag\">Managed IT<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/you-need-regular-it-assessments\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-10-03T09:00:00-05:00\" >October 3, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/05\/The-Benefits-of-Co-Managed-IT-Services.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-10-03 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-05-23 15:51:41<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Why You Need To Perform Regular IT Assessments<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-32181 slide-entry-overview slide-loop-2 slide-parity-even  av_one_half  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/difference-break-fix-and-managed-it\/' data-rel='slide-1' class='slide-image' title='The Difference Between Break\/Fix and Managed IT Support'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/03\/Financial-advisor-making-notes-of-stock-changes-495x400.jpg\" class=\"wp-image-31873 avia-img-lazy-loading-not-31873 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/03\/Financial-advisor-making-notes-of-stock-changes-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/03\/Financial-advisor-making-notes-of-stock-changes-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: The Difference Between Break\/Fix and Managed IT Support\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/difference-break-fix-and-managed-it\/' title='The Difference Between Break\/Fix and Managed IT Support'>The Difference Between Break\/Fix and Managed IT Support<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/managed-it\/\" rel=\"tag\">Managed IT<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/difference-break-fix-and-managed-it\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-09-26T09:00:00-05:00\" >September 26, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/03\/Financial-advisor-making-notes-of-stock-changes.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-09-26 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-05-23 15:28:09<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>The Difference Between Break\/Fix and Managed IT Support<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-32178 slide-entry-overview slide-loop-3 slide-parity-odd  av_one_half first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/dangers-not-having-backup-disaster-recovery\/' data-rel='slide-1' class='slide-image' title='The Dangers of Not Having Backup and Disaster Recovery'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/09\/The-Dangers-of-Not-Having-Backup-and-Disaster-Recovery-495x400.jpg\" class=\"wp-image-32185 avia-img-lazy-loading-not-32185 attachment-portfolio size-portfolio wp-post-image\" alt=\"Dangers and Risks of Not Backing-Up Data\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/09\/The-Dangers-of-Not-Having-Backup-and-Disaster-Recovery-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/09\/The-Dangers-of-Not-Having-Backup-and-Disaster-Recovery-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: The Dangers of Not Having Backup and Disaster Recovery\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/dangers-not-having-backup-disaster-recovery\/' title='The Dangers of Not Having Backup and Disaster Recovery'>The Dangers of Not Having Backup and Disaster Recovery<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/managed-it\/\" rel=\"tag\">Managed IT<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/dangers-not-having-backup-disaster-recovery\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-09-19T09:00:00-05:00\" >September 19, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/09\/The-Dangers-of-Not-Having-Backup-and-Disaster-Recovery.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-09-19 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-05-23 15:33:13<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>The Dangers of Not Having Backup and Disaster Recovery<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-32175 slide-entry-overview slide-loop-4 slide-parity-even  av_one_half  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/modernizing-technology-at-work\/' data-rel='slide-1' class='slide-image' title='Modernizing Technology at Work'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/09\/Modernizing-Technology-at-Work-495x400.jpg\" class=\"wp-image-32187 avia-img-lazy-loading-not-32187 attachment-portfolio size-portfolio wp-post-image\" alt=\"Evolving Workplace Technology\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/09\/Modernizing-Technology-at-Work-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/09\/Modernizing-Technology-at-Work-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Modernizing Technology at Work\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/modernizing-technology-at-work\/' title='Modernizing Technology at Work'>Modernizing Technology at Work<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/managed-it\/\" rel=\"tag\">Managed IT<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/modernizing-technology-at-work\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-09-12T09:00:00-05:00\" >September 12, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/09\/Modernizing-Technology-at-Work.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-09-12 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-05-23 15:34:42<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Modernizing Technology at Work<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-32173 slide-entry-overview slide-loop-5 slide-parity-odd  av_one_half first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/msp-experience-managed-service-provider-needs\/' data-rel='slide-1' class='slide-image' title='MSP Experience Every Managed Service Provider Should Have'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/09\/MSP-Experience-Every-Managed-Service-Provider-Should-Have-495x400.jpg\" class=\"wp-image-32189 avia-img-lazy-loading-not-32189 attachment-portfolio size-portfolio wp-post-image\" alt=\"What to look for in a MSP\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/09\/MSP-Experience-Every-Managed-Service-Provider-Should-Have-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/09\/MSP-Experience-Every-Managed-Service-Provider-Should-Have-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: MSP Experience Every Managed Service Provider Should Have\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/msp-experience-managed-service-provider-needs\/' title='MSP Experience Every Managed Service Provider Should Have'>MSP Experience Every Managed Service Provider Should Have<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/managed-it\/\" rel=\"tag\">Managed IT<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/msp-experience-managed-service-provider-needs\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-09-05T09:00:00-05:00\" >September 5, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/09\/MSP-Experience-Every-Managed-Service-Provider-Should-Have.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-09-05 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-05-23 15:30:15<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>MSP Experience Every Managed Service Provider Should Have<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-32172 slide-entry-overview slide-loop-6 slide-parity-even  av_one_half  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/' data-rel='slide-1' class='slide-image' title='What\u2019s the Actual Cost of a Data Breach?'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Whats-the-Actual-Cost-of-a-Data-Breach_-495x400.jpg\" class=\"wp-image-32191 avia-img-lazy-loading-not-32191 attachment-portfolio size-portfolio wp-post-image\" alt=\"How much does a data breach really cost?\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Whats-the-Actual-Cost-of-a-Data-Breach_-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Whats-the-Actual-Cost-of-a-Data-Breach_-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: What\u2019s the Actual Cost of a Data Breach?\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/' title='What\u2019s the Actual Cost of a Data Breach?'>What\u2019s the Actual Cost of a Data Breach?<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/cybersecurity\/\" rel=\"tag\">Cybersecurity<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-08-29T09:00:00-05:00\" >August 29, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Whats-the-Actual-Cost-of-a-Data-Breach_.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-08-29 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-05-23 15:31:44<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>What\u2019s the Actual Cost of a Data Breach?<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-32171 slide-entry-overview slide-loop-7 slide-parity-odd  av_one_half first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/benefits-of-it-and-reliable-msp\/' data-rel='slide-1' class='slide-image' title='Benefits of IT and Why You Need a Reliable MSP'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Benefits-of-IT-and-Why-You-Need-a-Reliable-MSP-495x400.jpg\" class=\"wp-image-32196 avia-img-lazy-loading-not-32196 attachment-portfolio size-portfolio wp-post-image\" alt=\"Why you need a reliable MSP partner\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Benefits-of-IT-and-Why-You-Need-a-Reliable-MSP-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Benefits-of-IT-and-Why-You-Need-a-Reliable-MSP-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Benefits of IT and Why You Need a Reliable MSP\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/benefits-of-it-and-reliable-msp\/' title='Benefits of IT and Why You Need a Reliable MSP'>Benefits of IT and Why You Need a Reliable MSP<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/managed-it\/\" rel=\"tag\">Managed IT<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/benefits-of-it-and-reliable-msp\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-08-22T09:00:00-05:00\" >August 22, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Benefits-of-IT-and-Why-You-Need-a-Reliable-MSP.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-08-22 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-10-12 13:20:31<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Benefits of IT and Why You Need a Reliable MSP<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-32168 slide-entry-overview slide-loop-8 slide-parity-even  av_one_half  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/why-business-needs-an-it-assessment\/' data-rel='slide-1' class='slide-image' title='Why Your Business Needs an End-of-Year IT Assessment'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Why-Your-Business-Needs-an-End-of-Year-IT-Assessment-495x400.jpg\" class=\"wp-image-32195 avia-img-lazy-loading-not-32195 attachment-portfolio size-portfolio wp-post-image\" alt=\"End of the Year IT Assessment\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Why-Your-Business-Needs-an-End-of-Year-IT-Assessment-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Why-Your-Business-Needs-an-End-of-Year-IT-Assessment-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Why Your Business Needs an End-of-Year IT Assessment\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/why-business-needs-an-it-assessment\/' title='Why Your Business Needs an End-of-Year IT Assessment'>Why Your Business Needs an End-of-Year IT Assessment<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/managed-it\/\" rel=\"tag\">Managed IT<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/why-business-needs-an-it-assessment\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-08-15T09:00:00-05:00\" >August 15, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Why-Your-Business-Needs-an-End-of-Year-IT-Assessment.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-08-15 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-08-18 15:18:05<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Why Your Business Needs an End-of-Year IT Assessment<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-32167 slide-entry-overview slide-loop-9 slide-parity-odd  av_one_half first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/identify-cyberthreats-and-deal-with-hackers\/' data-rel='slide-1' class='slide-image' title='How To Identify Cyberthreats and Deal With Hackers'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/How-To-Identify-Cyberthreats-and-Deal-With-Hackers-2-495x400.jpg\" class=\"wp-image-32198 avia-img-lazy-loading-not-32198 attachment-portfolio size-portfolio wp-post-image\" alt=\"You&#039;ve Spotted Suspicious Network Activity, Now What?\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/How-To-Identify-Cyberthreats-and-Deal-With-Hackers-2-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/How-To-Identify-Cyberthreats-and-Deal-With-Hackers-2-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: How To Identify Cyberthreats and Deal With Hackers\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/identify-cyberthreats-and-deal-with-hackers\/' title='How To Identify Cyberthreats and Deal With Hackers'>How To Identify Cyberthreats and Deal With Hackers<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/cybersecurity\/\" rel=\"tag\">Cybersecurity<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/identify-cyberthreats-and-deal-with-hackers\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-08-08T09:00:00-05:00\" >August 8, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/How-To-Identify-Cyberthreats-and-Deal-With-Hackers-2.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-08-08 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-05-23 15:10:32<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>How To Identify Cyberthreats and Deal With Hackers<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-32166 slide-entry-overview slide-loop-10 slide-parity-even  av_one_half  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/how-to-improve-cloud-computing-security\/' data-rel='slide-1' class='slide-image' title='Cloud 101: How To Improve Cloud Computing Security'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/How-To-Identify-Cyberthreats-and-Deal-With-Hackers-495x400.jpg\" class=\"wp-image-32194 avia-img-lazy-loading-not-32194 attachment-portfolio size-portfolio wp-post-image\" alt=\"Cloud 101: Tips To Staying Safe\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/How-To-Identify-Cyberthreats-and-Deal-With-Hackers-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/How-To-Identify-Cyberthreats-and-Deal-With-Hackers-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Cloud 101: How To Improve Cloud Computing Security\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/how-to-improve-cloud-computing-security\/' title='Cloud 101: How To Improve Cloud Computing Security'>Cloud 101: How To Improve Cloud Computing Security<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/cybersecurity\/\" rel=\"tag\">Cybersecurity<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/how-to-improve-cloud-computing-security\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-08-01T09:00:00-05:00\" >August 1, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/How-To-Identify-Cyberthreats-and-Deal-With-Hackers.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-08-01 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-05-23 15:14:00<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Cloud 101: How To Improve Cloud Computing Security<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-32164 slide-entry-overview slide-loop-11 slide-parity-odd  av_one_half first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/how-mistakes-with-it-documentation-hurt\/' data-rel='slide-1' class='slide-image' title='How Mistakes With IT Documentation Hurt Your Business'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Cloud-101_-How-To-Improve-Cloud-Computing-Security-495x400.jpg\" class=\"wp-image-32193 avia-img-lazy-loading-not-32193 attachment-portfolio size-portfolio wp-post-image\" alt=\"What Is IT Documentation_The Logic Group\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Cloud-101_-How-To-Improve-Cloud-Computing-Security-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Cloud-101_-How-To-Improve-Cloud-Computing-Security-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: How Mistakes With IT Documentation Hurt Your Business\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/how-mistakes-with-it-documentation-hurt\/' title='How Mistakes With IT Documentation Hurt Your Business'>How Mistakes With IT Documentation Hurt Your Business<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/managed-it\/\" rel=\"tag\">Managed IT<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/how-mistakes-with-it-documentation-hurt\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-07-25T09:00:00-05:00\" >July 25, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Cloud-101_-How-To-Improve-Cloud-Computing-Security.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-07-25 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-08-18 15:11:24<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>How Mistakes With IT Documentation Hurt Your Business<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-32163 slide-entry-overview slide-loop-12 slide-parity-even  av_one_half  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/managed-services-kpis-to-measure-monitor\/' data-rel='slide-1' class='slide-image' title='11 Vital Managed Services KPIs To Measure and Monitor'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/How-Mistakes-With-IT-Documentation-Hurt-Your-Business-495x400.jpg\" class=\"wp-image-32192 avia-img-lazy-loading-not-32192 attachment-portfolio size-portfolio wp-post-image\" alt=\"12 Vital MSP KPIMSP KPI\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/How-Mistakes-With-IT-Documentation-Hurt-Your-Business-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/How-Mistakes-With-IT-Documentation-Hurt-Your-Business-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: 11 Vital Managed Services KPIs To Measure and Monitor\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/managed-services-kpis-to-measure-monitor\/' title='11 Vital Managed Services KPIs To Measure and Monitor'>11 Vital Managed Services KPIs To Measure and Monitor<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/managed-it\/\" rel=\"tag\">Managed IT<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/managed-services-kpis-to-measure-monitor\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-07-18T09:00:00-05:00\" >July 18, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/How-Mistakes-With-IT-Documentation-Hurt-Your-Business.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-07-18 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-08-18 15:14:33<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>11 Vital Managed Services KPIs To Measure and Monitor<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-32162 slide-entry-overview slide-loop-13 slide-parity-odd  av_one_half first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/' data-rel='slide-1' class='slide-image' title='2021 Cybersecurity Trends: Everything You Should Know'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/Cybersecurity-Trends-in-2021-July-Blog-2-495x400.jpg\" class=\"wp-image-31979 avia-img-lazy-loading-not-31979 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/Cybersecurity-Trends-in-2021-July-Blog-2-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/Cybersecurity-Trends-in-2021-July-Blog-2-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: 2021 Cybersecurity Trends: Everything You Should Know\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/' title='2021 Cybersecurity Trends: Everything You Should Know'>2021 Cybersecurity Trends: Everything You Should Know<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/cybersecurity\/\" rel=\"tag\">Cybersecurity<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-07-11T09:00:00-05:00\" >July 11, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/Cybersecurity-Trends-in-2021-July-Blog-2.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-07-11 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-08-18 15:08:29<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>2021 Cybersecurity Trends: Everything You Should Know<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-32160 slide-entry-overview slide-loop-14 slide-parity-even  av_one_half  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/cybersecurity-how-to-secure-remote-employees\/' data-rel='slide-1' class='slide-image' title='Cybersecurity: How To Secure Remote Employees'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/How-to-secure-remote-employees-July-Blog-1-495x400.jpg\" class=\"wp-image-31980 avia-img-lazy-loading-not-31980 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/How-to-secure-remote-employees-July-Blog-1-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/How-to-secure-remote-employees-July-Blog-1-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Cybersecurity: How To Secure Remote Employees\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/cybersecurity-how-to-secure-remote-employees\/' title='Cybersecurity: How To Secure Remote Employees'>Cybersecurity: How To Secure Remote Employees<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/cybersecurity\/\" rel=\"tag\">Cybersecurity<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/cybersecurity-how-to-secure-remote-employees\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-07-04T09:00:00-05:00\" >July 4, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/How-to-secure-remote-employees-July-Blog-1.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-07-04 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-08-18 15:09:54<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Cybersecurity: How To Secure Remote Employees<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-32159 slide-entry-overview slide-loop-15 slide-parity-odd  av_one_half first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/it-support-trends-for-2021\/' data-rel='slide-1' class='slide-image' title='IT Support Trends for 2021'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/June-Blog-2-495x400.jpg\" class=\"wp-image-31960 avia-img-lazy-loading-not-31960 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/June-Blog-2-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/June-Blog-2-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: IT Support Trends for 2021\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/it-support-trends-for-2021\/' title='IT Support Trends for 2021'>IT Support Trends for 2021<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/managed-it\/\" rel=\"tag\">Managed IT<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/it-support-trends-for-2021\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-06-27T09:00:00-05:00\" >June 27, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/June-Blog-2.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-06-27 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-08-18 15:14:02<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>IT Support Trends for 2021<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-32157 slide-entry-overview slide-loop-16 slide-parity-even  av_one_half  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/' data-rel='slide-1' class='slide-image' title='Hackers Are Targeting Office 365 With Phishing Scams'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/June-Blog-1-495x400.jpg\" class=\"wp-image-31959 avia-img-lazy-loading-not-31959 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/June-Blog-1-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/June-Blog-1-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Hackers Are Targeting Office 365 With Phishing Scams\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/' title='Hackers Are Targeting Office 365 With Phishing Scams'>Hackers Are Targeting Office 365 With Phishing Scams<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/cybersecurity\/\" rel=\"tag\">Cybersecurity<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-06-20T09:00:00-05:00\" >June 20, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/June-Blog-1.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-06-20 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-08-18 15:10:42<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Hackers Are Targeting Office 365 With Phishing Scams<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-32155 slide-entry-overview slide-loop-17 slide-parity-odd  av_one_half first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/what-is-co-managed-it-services\/' data-rel='slide-1' class='slide-image' title='What Is Co-Managed IT Services and How Does It Fit My Business?'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/05\/What-is-co-managed-it-and-how-does-it-fit-my-business-May-2-495x400.jpg\" class=\"wp-image-31922 avia-img-lazy-loading-not-31922 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/05\/What-is-co-managed-it-and-how-does-it-fit-my-business-May-2-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/05\/What-is-co-managed-it-and-how-does-it-fit-my-business-May-2-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: What Is Co-Managed IT Services and How Does It Fit My Business?\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/what-is-co-managed-it-services\/' title='What Is Co-Managed IT Services and How Does It Fit My Business?'>What Is Co-Managed IT Services and How Does It Fit My Business?<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/managed-it\/\" rel=\"tag\">Managed IT<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/what-is-co-managed-it-services\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-06-13T09:00:00-05:00\" >June 13, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/05\/What-is-co-managed-it-and-how-does-it-fit-my-business-May-2.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-06-13 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-08-18 15:17:20<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>What Is Co-Managed IT Services and How Does It Fit My Business?<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-32154 slide-entry-overview slide-loop-18 slide-parity-even  av_one_half  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/most-common-cyber-security-attacks\/' data-rel='slide-1' class='slide-image' title='Most Common Cyber Security Attacks'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/05\/Most-common-types-of-cyber-attacks-May-1-495x400.jpg\" class=\"wp-image-31921 avia-img-lazy-loading-not-31921 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/05\/Most-common-types-of-cyber-attacks-May-1-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/05\/Most-common-types-of-cyber-attacks-May-1-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Most Common Cyber Security Attacks\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/most-common-cyber-security-attacks\/' title='Most Common Cyber Security Attacks'>Most Common Cyber Security Attacks<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/cybersecurity\/\" rel=\"tag\">Cybersecurity<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/most-common-cyber-security-attacks\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-06-06T09:00:00-05:00\" >June 6, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/05\/Most-common-types-of-cyber-attacks-May-1.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-06-06 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-05-02 13:24:55<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Most Common Cyber Security Attacks<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-32153 slide-entry-overview slide-loop-19 slide-parity-odd  av_one_half first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/why-use-managed-services-in-2021\/' data-rel='slide-1' class='slide-image' title='Why Use Managed Services in 2021'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/08\/TLG-September-Blog-2-495x400.jpg\" class=\"wp-image-31987 avia-img-lazy-loading-not-31987 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/08\/TLG-September-Blog-2-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/08\/TLG-September-Blog-2-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Why Use Managed Services in 2021\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/why-use-managed-services-in-2021\/' title='Why Use Managed Services in 2021'>Why Use Managed Services in 2021<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/managed-it\/\" rel=\"tag\">Managed IT<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/why-use-managed-services-in-2021\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-05-30T09:00:00-05:00\" >May 30, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/08\/TLG-September-Blog-2.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-05-30 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-08-18 15:18:42<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Why Use Managed Services in 2021<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-32152 slide-entry-overview slide-loop-20 slide-parity-even  av_one_half  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/what-is-an-information-security-program\/' data-rel='slide-1' class='slide-image' title='What Is in an Information Security Program?'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/08\/TLG-September-Blog-1-495x400.jpg\" class=\"wp-image-31986 avia-img-lazy-loading-not-31986 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/08\/TLG-September-Blog-1-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/08\/TLG-September-Blog-1-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: What Is in an Information Security Program?\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/what-is-an-information-security-program\/' title='What Is in an Information Security Program?'>What Is in an Information Security Program?<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/cybersecurity\/\" rel=\"tag\">Cybersecurity<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/what-is-an-information-security-program\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-05-23T09:00:00-05:00\" >May 23, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/08\/TLG-September-Blog-1.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-05-23 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-08-18 15:15:56<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>What Is in an Information Security Program?<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-32148 slide-entry-overview slide-loop-21 slide-parity-odd  av_one_half first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/' data-rel='slide-1' class='slide-image' title='Steps on How To Protect Against Identity Theft'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/07\/TLG-August-Blog-2-495x400.jpg\" class=\"wp-image-31984 avia-img-lazy-loading-not-31984 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/07\/TLG-August-Blog-2-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/07\/TLG-August-Blog-2-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Steps on How To Protect Against Identity Theft\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/' title='Steps on How To Protect Against Identity Theft'>Steps on How To Protect Against Identity Theft<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/cybersecurity\/\" rel=\"tag\">Cybersecurity<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-05-16T09:00:00-05:00\" >May 16, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/07\/TLG-August-Blog-2.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-05-16 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-08-18 15:12:05<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Steps on How To Protect Against Identity Theft<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-32147 slide-entry-overview slide-loop-22 slide-parity-even  av_one_half  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/7-ways-to-prevent-ransomware\/' data-rel='slide-1' class='slide-image' title='7 Ways To Prevent Ransomware'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/07\/TLG-August-Blog-1-495x400.jpg\" class=\"wp-image-31983 avia-img-lazy-loading-not-31983 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/07\/TLG-August-Blog-1-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/07\/TLG-August-Blog-1-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: 7 Ways To Prevent Ransomware\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/7-ways-to-prevent-ransomware\/' title='7 Ways To Prevent Ransomware'>7 Ways To Prevent Ransomware<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/cybersecurity\/\" rel=\"tag\">Cybersecurity<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/7-ways-to-prevent-ransomware\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-05-09T09:00:00-05:00\" >May 9, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/07\/TLG-August-Blog-1.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-05-09 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-08-18 15:09:08<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>7 Ways To Prevent Ransomware<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-32142 slide-entry-overview slide-loop-23 slide-parity-odd  av_one_half first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/how-often-should-security-audits-performed\/' data-rel='slide-1' class='slide-image' title='How Often Should Security Audits Be Performed and Why?'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/04\/How-often-should-security-audits-be-performed-April-Blog-2-495x400.jpg\" class=\"wp-image-31917 avia-img-lazy-loading-not-31917 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/04\/How-often-should-security-audits-be-performed-April-Blog-2-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/04\/How-often-should-security-audits-be-performed-April-Blog-2-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: How Often Should Security Audits Be Performed and Why?\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/how-often-should-security-audits-performed\/' title='How Often Should Security Audits Be Performed and Why?'>How Often Should Security Audits Be Performed and Why?<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/cybersecurity\/\" rel=\"tag\">Cybersecurity<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/how-often-should-security-audits-performed\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-05-02T09:00:00-05:00\" >May 2, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/04\/How-often-should-security-audits-be-performed-April-Blog-2.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-05-02 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-04-19 13:28:41<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>How Often Should Security Audits Be Performed and Why?<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-32140 slide-entry-overview slide-loop-24 slide-parity-even  av_one_half  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/different-levels-of-it-support\/' data-rel='slide-1' class='slide-image' title='Different Levels of IT Support'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/04\/What-are-the-different-tiers-levels-of-IT-Support-April-Blog-1-495x400.jpg\" class=\"wp-image-31918 avia-img-lazy-loading-not-31918 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/04\/What-are-the-different-tiers-levels-of-IT-Support-April-Blog-1-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/04\/What-are-the-different-tiers-levels-of-IT-Support-April-Blog-1-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Different Levels of IT Support\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/different-levels-of-it-support\/' title='Different Levels of IT Support'>Different Levels of IT Support<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/managed-it\/\" rel=\"tag\">Managed IT<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/different-levels-of-it-support\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-04-25T09:00:00-05:00\" >April 25, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/04\/What-are-the-different-tiers-levels-of-IT-Support-April-Blog-1.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-04-25 09:00:00<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-04-19 13:09:35<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Different Levels of IT Support<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-32080 slide-entry-overview slide-loop-25 slide-parity-odd  av_one_half first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/keeping-your-network-secure-while-working-from-home\/' data-rel='slide-1' class='slide-image' title='Keeping Your Network Secure While Working From Home'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Keeping-Your-Network-Secure-While-Working-From-Home-Copy-495x400.jpg\" class=\"wp-image-32081 avia-img-lazy-loading-not-32081 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Keeping Your Network Secure While Working From Home\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/keeping-your-network-secure-while-working-from-home\/' title='Keeping Your Network Secure While Working From Home'>Keeping Your Network Secure While Working From Home<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/cybersecurity\/\" rel=\"tag\">Cybersecurity<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/keeping-your-network-secure-while-working-from-home\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-03-01T23:22:31-05:00\" >March 1, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Keeping-Your-Network-Secure-While-Working-From-Home-Copy.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>500<\/span>\n\t\t\t\t\t\t<span itemprop='width'>500<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Doug Yocco<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Doug Yocco<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-03-01 23:22:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-04-05 14:45:44<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Keeping Your Network Secure While Working From Home<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-32100 slide-entry-overview slide-loop-26 slide-parity-even  av_one_half  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/digital-security-tips-blog-the-logic-group\/' data-rel='slide-1' class='slide-image' title='Digital Security Tips | Blog | The Logic Group'><img decoding=\"async\" fetchpriority=\"high\" width=\"424\" height=\"318\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Digital-Security-Tips.jpg\" class=\"wp-image-32101 avia-img-lazy-loading-not-32101 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Digital-Security-Tips.jpg 424w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Digital-Security-Tips-300x225.jpg 300w\" sizes=\"(max-width: 424px) 100vw, 424px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Digital Security Tips | Blog | The Logic Group\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/digital-security-tips-blog-the-logic-group\/' title='Digital Security Tips | Blog | The Logic Group'>Digital Security Tips | Blog | The Logic Group<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/cybersecurity\/\" rel=\"tag\">Cybersecurity<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/digital-security-tips-blog-the-logic-group\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-03-01T23:22:31-05:00\" >March 1, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Digital-Security-Tips.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>318<\/span>\n\t\t\t\t\t\t<span itemprop='width'>424<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Doug Yocco<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Doug Yocco<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-03-01 23:22:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-04-05 14:41:59<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Digital Security Tips | Blog | The Logic Group<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-32096 slide-entry-overview slide-loop-27 slide-parity-odd  av_one_half first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/' data-rel='slide-1' class='slide-image' title='Combat Digital Theft | Blog | The Logic Group'><img decoding=\"async\" fetchpriority=\"high\" width=\"424\" height=\"318\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Combat-Digital-Theft.jpg\" class=\"wp-image-32097 avia-img-lazy-loading-not-32097 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Combat-Digital-Theft.jpg 424w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Combat-Digital-Theft-300x225.jpg 300w\" sizes=\"(max-width: 424px) 100vw, 424px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Combat Digital Theft | Blog | The Logic Group\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/' title='Combat Digital Theft | Blog | The Logic Group'>Combat Digital Theft | Blog | The Logic Group<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/cybersecurity\/\" rel=\"tag\">Cybersecurity<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-03-01T23:22:31-05:00\" >March 1, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Combat-Digital-Theft.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>318<\/span>\n\t\t\t\t\t\t<span itemprop='width'>424<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Doug Yocco<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Doug Yocco<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-03-01 23:22:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-04-05 14:40:05<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Combat Digital Theft | Blog | The Logic Group<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-32093 slide-entry-overview slide-loop-28 slide-parity-even  av_one_half  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/' data-rel='slide-1' class='slide-image' title='Cybercrimes &#038; Small Businesses | Blog | The Logic Group'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Cybercrimes-Small-Businesses-1-495x400.jpg\" class=\"wp-image-32094 avia-img-lazy-loading-not-32094 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Cybercrimes &amp; Small Businesses | Blog | The Logic Group\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/' title='Cybercrimes &#038; Small Businesses | Blog | The Logic Group'>Cybercrimes &#038; Small Businesses | Blog | The Logic Group<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/cybersecurity\/\" rel=\"tag\">Cybersecurity<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-03-01T23:22:31-05:00\" >March 1, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Cybercrimes-Small-Businesses-1.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>800<\/span>\n\t\t\t\t\t\t<span itemprop='width'>800<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Doug Yocco<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Doug Yocco<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-03-01 23:22:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-04-05 14:40:55<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Cybercrimes &#038; Small Businesses | Blog | The Logic Group<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-32091 slide-entry-overview slide-loop-29 slide-parity-odd  av_one_half first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/phishing-and-ransomware-blog-the-logic-group\/' data-rel='slide-1' class='slide-image' title='Phishing and Ransomware | Blog | The Logic Group'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Phishing-and-Ransomware-495x400.jpg\" class=\"wp-image-32092 avia-img-lazy-loading-not-32092 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Phishing and Ransomware | Blog | The Logic Group\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/phishing-and-ransomware-blog-the-logic-group\/' title='Phishing and Ransomware | Blog | The Logic Group'>Phishing and Ransomware | Blog | The Logic Group<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/cybersecurity\/\" rel=\"tag\">Cybersecurity<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/phishing-and-ransomware-blog-the-logic-group\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-03-01T23:22:31-05:00\" >March 1, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Phishing-and-Ransomware.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>800<\/span>\n\t\t\t\t\t\t<span itemprop='width'>800<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Doug Yocco<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Doug Yocco<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-03-01 23:22:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-04-05 14:46:55<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Phishing and Ransomware | Blog | The Logic Group<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-32089 slide-entry-overview slide-loop-30 slide-parity-even  av_one_half  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/what-constitutes-effective-security-measures-in-your-business\/' data-rel='slide-1' class='slide-image' title='What Constitutes Effective Security Measures in Your Business?'><img decoding=\"async\" fetchpriority=\"high\" width=\"430\" height=\"330\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/What-Constitutes-Effective-Security-Measures-in-Your-Business.jpg\" class=\"wp-image-32090 avia-img-lazy-loading-not-32090 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/What-Constitutes-Effective-Security-Measures-in-Your-Business.jpg 430w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/What-Constitutes-Effective-Security-Measures-in-Your-Business-300x230.jpg 300w\" sizes=\"(max-width: 430px) 100vw, 430px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: What Constitutes Effective Security Measures in Your Business?\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/what-constitutes-effective-security-measures-in-your-business\/' title='What Constitutes Effective Security Measures in Your Business?'>What Constitutes Effective Security Measures in Your Business?<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/cybersecurity\/\" rel=\"tag\">Cybersecurity<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/what-constitutes-effective-security-measures-in-your-business\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-03-01T23:22:31-05:00\" >March 1, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/What-Constitutes-Effective-Security-Measures-in-Your-Business.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>330<\/span>\n\t\t\t\t\t\t<span itemprop='width'>430<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Doug Yocco<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Doug Yocco<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-03-01 23:22:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-04-05 15:01:36<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>What Constitutes Effective Security Measures in Your Business?<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-32085 slide-entry-overview slide-loop-31 slide-parity-odd  av_one_half first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/if-it-happened-to-them-it-can-happen-to-you-and-your-small-business\/' data-rel='slide-1' class='slide-image' title='If It Happened to Them It Can Happen to You and Your Small Business'><img decoding=\"async\" fetchpriority=\"high\" width=\"430\" height=\"330\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/If-It-Happened-to-Them-It-Can-Happen-to-You-and-Your-Small-Business-Copy.jpg\" class=\"wp-image-32086 avia-img-lazy-loading-not-32086 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/If-It-Happened-to-Them-It-Can-Happen-to-You-and-Your-Small-Business-Copy.jpg 430w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/If-It-Happened-to-Them-It-Can-Happen-to-You-and-Your-Small-Business-Copy-300x230.jpg 300w\" sizes=\"(max-width: 430px) 100vw, 430px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: If It Happened to Them It Can Happen to You and Your Small Business\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/if-it-happened-to-them-it-can-happen-to-you-and-your-small-business\/' title='If It Happened to Them It Can Happen to You and Your Small Business'>If It Happened to Them It Can Happen to You and Your Small Business<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/cybersecurity\/\" rel=\"tag\">Cybersecurity<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/if-it-happened-to-them-it-can-happen-to-you-and-your-small-business\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-03-01T23:22:31-05:00\" >March 1, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/If-It-Happened-to-Them-It-Can-Happen-to-You-and-Your-Small-Business-Copy.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>330<\/span>\n\t\t\t\t\t\t<span itemprop='width'>430<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Doug Yocco<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Doug Yocco<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-03-01 23:22:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-04-05 15:00:01<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>If It Happened to Them It Can Happen to You and Your Small Business<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-32082 slide-entry-overview slide-loop-32 slide-parity-even  av_one_half  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/protect-your-business-with-a-virtual-ciso-vciso-the-logic-group\/' data-rel='slide-1' class='slide-image' title='Protect Your Business with a Virtual CISO (vCISO) | The Logic Group'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Protect-Your-Business-with-a-Virtual-CISO-vCISO-Copy-495x400.jpg\" class=\"wp-image-32083 avia-img-lazy-loading-not-32083 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Protect Your Business with a Virtual CISO (vCISO) | The Logic Group\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/protect-your-business-with-a-virtual-ciso-vciso-the-logic-group\/' title='Protect Your Business with a Virtual CISO (vCISO) | The Logic Group'>Protect Your Business with a Virtual CISO (vCISO) | The Logic Group<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/cybersecurity\/\" rel=\"tag\">Cybersecurity<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/protect-your-business-with-a-virtual-ciso-vciso-the-logic-group\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-03-01T23:22:31-05:00\" >March 1, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Protect-Your-Business-with-a-Virtual-CISO-vCISO-Copy.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>800<\/span>\n\t\t\t\t\t\t<span itemprop='width'>800<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Doug Yocco<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Doug Yocco<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-03-01 23:22:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-04-05 15:00:34<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Protect Your Business with a Virtual CISO (vCISO) | The Logic Group<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-32076 slide-entry-overview slide-loop-33 slide-parity-odd  av_one_half first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/get-the-most-out-of-video-collaboration\/' data-rel='slide-1' class='slide-image' title='Get the Most Out of Video Collaboration'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Get-the-Most-Out-of-Video-Collaboration-495x400.jpg\" class=\"wp-image-32077 avia-img-lazy-loading-not-32077 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Get the Most Out of Video Collaboration\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/get-the-most-out-of-video-collaboration\/' title='Get the Most Out of Video Collaboration'>Get the Most Out of Video Collaboration<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/managed-it\/\" rel=\"tag\">Managed IT<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/get-the-most-out-of-video-collaboration\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-03-01T23:22:31-05:00\" >March 1, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Get-the-Most-Out-of-Video-Collaboration.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>800<\/span>\n\t\t\t\t\t\t<span itemprop='width'>800<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>wpengine<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>wpengine<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-03-01 23:22:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-04-05 15:03:18<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Get the Most Out of Video Collaboration<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-32098 slide-entry-overview slide-loop-34 slide-parity-even  av_one_half  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/3-questions-to-ask-a-potential-it-provider-blog-the-logic-group\/' data-rel='slide-1' class='slide-image' title='3 Questions to Ask a Potential IT Provider | Blog | The Logic Group'><img decoding=\"async\" fetchpriority=\"high\" width=\"424\" height=\"318\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/3-Questions-to-Ask-a-Potential-IT-Provider.png\" class=\"wp-image-32099 avia-img-lazy-loading-not-32099 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/3-Questions-to-Ask-a-Potential-IT-Provider.png 424w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/3-Questions-to-Ask-a-Potential-IT-Provider-300x225.png 300w\" sizes=\"(max-width: 424px) 100vw, 424px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: 3 Questions to Ask a Potential IT Provider | Blog | The Logic Group\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/3-questions-to-ask-a-potential-it-provider-blog-the-logic-group\/' title='3 Questions to Ask a Potential IT Provider | Blog | The Logic Group'>3 Questions to Ask a Potential IT Provider | Blog | The Logic Group<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/managed-it\/\" rel=\"tag\">Managed IT<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/3-questions-to-ask-a-potential-it-provider-blog-the-logic-group\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-03-01T23:22:31-05:00\" >March 1, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/3-Questions-to-Ask-a-Potential-IT-Provider.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>318<\/span>\n\t\t\t\t\t\t<span itemprop='width'>424<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Doug Yocco<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Doug Yocco<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-03-01 23:22:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-04-05 14:59:31<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>3 Questions to Ask a Potential IT Provider | Blog | The Logic Group<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-32095 slide-entry-overview slide-loop-35 slide-parity-odd  av_one_half first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/reliable-it-support-in-the-philadelphia-area-blog-the-logic-group\/' data-rel='slide-1' class='slide-image' title='Reliable IT Support in the Philadelphia Area | Blog | The Logic Group'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/05\/Reliable-IT-Support-in-the-Philadelphia-Area-495x400.jpg\" class=\"wp-image-32201 avia-img-lazy-loading-not-32201 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/05\/Reliable-IT-Support-in-the-Philadelphia-Area-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/05\/Reliable-IT-Support-in-the-Philadelphia-Area-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Reliable IT Support in the Philadelphia Area | Blog | The Logic Group\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/reliable-it-support-in-the-philadelphia-area-blog-the-logic-group\/' title='Reliable IT Support in the Philadelphia Area | Blog | The Logic Group'>Reliable IT Support in the Philadelphia Area | Blog | The Logic Group<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/managed-it\/\" rel=\"tag\">Managed IT<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/reliable-it-support-in-the-philadelphia-area-blog-the-logic-group\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-03-01T23:22:31-05:00\" >March 1, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/05\/Reliable-IT-Support-in-the-Philadelphia-Area.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Doug Yocco<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Doug Yocco<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-03-01 23:22:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-05-18 12:38:10<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Reliable IT Support in the Philadelphia Area | Blog | The Logic Group<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-32087 slide-entry-overview slide-loop-36 slide-parity-even  av_one_half  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/why-is-finding-the-right-it-support-for-healthcare-and-hipaa-compliance-critical\/' data-rel='slide-1' class='slide-image' title='Why is Finding the Right IT Support for Healthcare and HIPAA Compliance Critical?'><img decoding=\"async\" fetchpriority=\"high\" width=\"430\" height=\"330\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Why-is-Finding-the-Right-IT-Support-for-Healthcare-and-HIPAA-Compliance-Critical-Copy.jpg\" class=\"wp-image-32088 avia-img-lazy-loading-not-32088 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Why-is-Finding-the-Right-IT-Support-for-Healthcare-and-HIPAA-Compliance-Critical-Copy.jpg 430w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Why-is-Finding-the-Right-IT-Support-for-Healthcare-and-HIPAA-Compliance-Critical-Copy-300x230.jpg 300w\" sizes=\"(max-width: 430px) 100vw, 430px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Why is Finding the Right IT Support for Healthcare and HIPAA Compliance Critical?\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/why-is-finding-the-right-it-support-for-healthcare-and-hipaa-compliance-critical\/' title='Why is Finding the Right IT Support for Healthcare and HIPAA Compliance Critical?'>Why is Finding the Right IT Support for Healthcare and HIPAA Compliance Critical?<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/managed-it\/\" rel=\"tag\">Managed IT<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/why-is-finding-the-right-it-support-for-healthcare-and-hipaa-compliance-critical\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-03-01T23:22:31-05:00\" >March 1, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Why-is-Finding-the-Right-IT-Support-for-Healthcare-and-HIPAA-Compliance-Critical-Copy.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>330<\/span>\n\t\t\t\t\t\t<span itemprop='width'>430<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Doug Yocco<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Doug Yocco<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-03-01 23:22:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-04-05 15:02:05<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Why is Finding the Right IT Support for Healthcare and HIPAA Compliance Critical?<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-32084 slide-entry-overview slide-loop-37 slide-parity-odd  av_one_half first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/the-benefits-of-co-managed-it-services\/' data-rel='slide-1' class='slide-image' title='The Benefits of Co-Managed IT Services'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/05\/The-Benefits-of-Co-Managed-IT-Services-495x400.jpg\" class=\"wp-image-32202 avia-img-lazy-loading-not-32202 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/05\/The-Benefits-of-Co-Managed-IT-Services-495x400.jpg 495w, https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/05\/The-Benefits-of-Co-Managed-IT-Services-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: The Benefits of Co-Managed IT Services\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/the-benefits-of-co-managed-it-services\/' title='The Benefits of Co-Managed IT Services'>The Benefits of Co-Managed IT Services<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/managed-it\/\" rel=\"tag\">Managed IT<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/the-benefits-of-co-managed-it-services\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-03-01T23:22:31-05:00\" >March 1, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/05\/The-Benefits-of-Co-Managed-IT-Services.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1250<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Doug Yocco<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Doug Yocco<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-03-01 23:22:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-05-18 13:43:20<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>The Benefits of Co-Managed IT Services<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-32078 slide-entry-overview slide-loop-38 slide-parity-even  post-entry-last  av_one_half  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/thelogicgroup.com\/is-your-video-camera-irritating-your-audience\/' data-rel='slide-1' class='slide-image' title='Is Your Video Camera Irritating Your Audience?'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Is-Your-Video-Camera-Irritating-Your-Audience-495x400.jpg\" class=\"wp-image-32079 avia-img-lazy-loading-not-32079 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Is Your Video Camera Irritating Your Audience?\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/thelogicgroup.com\/is-your-video-camera-irritating-your-audience\/' title='Is Your Video Camera Irritating Your Audience?'>Is Your Video Camera Irritating Your Audience?<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/thelogicgroup.com\/category\/managed-it\/\" rel=\"tag\">Managed IT<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/thelogicgroup.com\/is-your-video-camera-irritating-your-audience\/\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-03-01T23:22:31-05:00\" >March 1, 2022<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Is-Your-Video-Camera-Irritating-Your-Audience.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>500<\/span>\n\t\t\t\t\t\t<span itemprop='width'>500<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Doug Yocco<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>\/wp-content\/uploads\/2021\/01\/logic_group_logo_white-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Doug Yocco<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-17T18:17:21-05:00\" >2022-03-01 23:22:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-08-18 15:13:10<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Is Your Video Camera Irritating Your Audience?<\/span><\/span><\/span><\/article><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":21,"featured_media":31677,"parent":30085,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-30791","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Use Our Blog as an IT Reference | The Logic Group<\/title>\n<meta name=\"description\" content=\"Looking for information about our service offerings and the latest IT news and trends? Use our blog as a reference for both.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thelogicgroup.com\/about\/blog\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Use Our Blog as an IT Reference | The Logic Group\" \/>\n<meta property=\"og:description\" content=\"Looking for information about our service offerings and the latest IT news and trends? Use our blog as a reference for both.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thelogicgroup.com\/about\/blog\/\" \/>\n<meta property=\"og:site_name\" content=\"The Logic Group\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-14T16:14:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/02\/Perspective-view-of-server-room-with-icons-floating-around.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/thelogicgroup.com\/about\/blog\/\",\"url\":\"https:\/\/thelogicgroup.com\/about\/blog\/\",\"name\":\"Use Our Blog as an IT Reference | The Logic Group\",\"isPartOf\":{\"@id\":\"https:\/\/thelogicgroup.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/thelogicgroup.com\/about\/blog\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/thelogicgroup.com\/about\/blog\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/02\/Perspective-view-of-server-room-with-icons-floating-around.jpg\",\"datePublished\":\"2019-06-17T18:17:21+00:00\",\"dateModified\":\"2022-03-14T16:14:25+00:00\",\"description\":\"Looking for information about our service offerings and the latest IT news and trends? Use our blog as a reference for both.\",\"breadcrumb\":{\"@id\":\"https:\/\/thelogicgroup.com\/about\/blog\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/thelogicgroup.com\/about\/blog\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/thelogicgroup.com\/about\/blog\/#primaryimage\",\"url\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/02\/Perspective-view-of-server-room-with-icons-floating-around.jpg\",\"contentUrl\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/02\/Perspective-view-of-server-room-with-icons-floating-around.jpg\",\"width\":2000,\"height\":1250},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/thelogicgroup.com\/about\/blog\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/thelogicgroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"About Our Team\",\"item\":\"https:\/\/thelogicgroup.com\/about\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Blogs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/thelogicgroup.com\/#website\",\"url\":\"https:\/\/thelogicgroup.com\/\",\"name\":\"The Logic Group\",\"description\":\"Turn to The Logic Group for all your Philadelphia managed IT services.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/thelogicgroup.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Use Our Blog as an IT Reference | The Logic Group","description":"Looking for information about our service offerings and the latest IT news and trends? Use our blog as a reference for both.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thelogicgroup.com\/about\/blog\/","og_locale":"en_US","og_type":"article","og_title":"Use Our Blog as an IT Reference | The Logic Group","og_description":"Looking for information about our service offerings and the latest IT news and trends? Use our blog as a reference for both.","og_url":"https:\/\/thelogicgroup.com\/about\/blog\/","og_site_name":"The Logic Group","article_modified_time":"2022-03-14T16:14:25+00:00","og_image":[{"width":2000,"height":1250,"url":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/02\/Perspective-view-of-server-room-with-icons-floating-around.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/thelogicgroup.com\/about\/blog\/","url":"https:\/\/thelogicgroup.com\/about\/blog\/","name":"Use Our Blog as an IT Reference | The Logic Group","isPartOf":{"@id":"https:\/\/thelogicgroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/thelogicgroup.com\/about\/blog\/#primaryimage"},"image":{"@id":"https:\/\/thelogicgroup.com\/about\/blog\/#primaryimage"},"thumbnailUrl":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/02\/Perspective-view-of-server-room-with-icons-floating-around.jpg","datePublished":"2019-06-17T18:17:21+00:00","dateModified":"2022-03-14T16:14:25+00:00","description":"Looking for information about our service offerings and the latest IT news and trends? Use our blog as a reference for both.","breadcrumb":{"@id":"https:\/\/thelogicgroup.com\/about\/blog\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thelogicgroup.com\/about\/blog\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thelogicgroup.com\/about\/blog\/#primaryimage","url":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/02\/Perspective-view-of-server-room-with-icons-floating-around.jpg","contentUrl":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/02\/Perspective-view-of-server-room-with-icons-floating-around.jpg","width":2000,"height":1250},{"@type":"BreadcrumbList","@id":"https:\/\/thelogicgroup.com\/about\/blog\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/thelogicgroup.com\/"},{"@type":"ListItem","position":2,"name":"About Our Team","item":"https:\/\/thelogicgroup.com\/about\/"},{"@type":"ListItem","position":3,"name":"Blogs"}]},{"@type":"WebSite","@id":"https:\/\/thelogicgroup.com\/#website","url":"https:\/\/thelogicgroup.com\/","name":"The Logic Group","description":"Turn to The Logic Group for all your Philadelphia managed IT services.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thelogicgroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/pages\/30791","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/comments?post=30791"}],"version-history":[{"count":0,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/pages\/30791\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/pages\/30085"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/media\/31677"}],"wp:attachment":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/media?parent=30791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}