Responding to a disaster using a framework

Today, to meet the demands of the issues facing your business, the plan must be fluid and more importantly actionable.

The Importance Of Cyber Insurance

I’ve been in the cybersecurity industry for pretty much my entire adult life; it’s the only career I’ve ever had. And yet one of my favorite cybersecurity solutions to recommend to organizations is not even a solution I can provide for them. I’m talking about cyber insurance.

Why Cybersecurity Is So Complicated

When you think of problems people had with cell phones back in the 80s, whether you experienced them firsthand or you’ve seen clips from movies, you know that it’s a completely different mobile world we live in today. That seems to be the case with most tech industries — regardless of the problems that first appear, they all get eliminated eventually until we are living in a completely different world.

Top Takeaways from ESG’s White Paper on Multicloud Storage Environments - Person using a tablet

Top Takeaways from ESG’s White Paper on Multicloud Storage Environments

Research shows that when an organization has taken the necessary steps to reach Storage Maturity, they have a competitive advantage due to their ability to properly harness the power of their data.

Home Cyber Hygiene Checklist

Our homes are becoming smarter and, as cool as that is, what’s even cooler are people who are as smart as their smart homes.

A New Opportunity for Cyber Attacks

There's a cybersecurity threat so troublesome that not even some of the best cybersecurity technology can stop it. It's called psychology, and it's used in any number of cybercrime attacks.

An important message to our customers & suppliers

At Mid-Range, the health of our employees, customers, partners and suppliers is our top priority. As we face the COVID-19 crisis, we would like to assure you that we will continue to help you navigate

7 Cybersecurity Tips

For today’s enterprise, the question is not whether you will be attacked. It’s when, by what, and how badly your company’s reputation or finances will be damaged. A Disaster Recovery Plan is key.

Cybersecurity Professionals

The Cybercrime Equation

Learn the best ways to keep your systems and your data safe from ransomware attacks, with advice from Danny Pehar, Bestselling Cybersecurity Author and Technology Council Member at Forbes.

Abstract blue nodes depicting big data

The Three “V”s of Big Data

Before you create your first draft of the schema or the architecture you must put into perspective this part of the problem you are being asked to solve. You must deal with the three “V”s of data which are volume, velocity, and variety.

Abstract Blue Image Data Connections and technology

Solution Decision Information Flow for Better Business Decisions

The use of a Solution Decision Information Flow can improve your business decisions. Read this article to see a real-world example of how it can help.

IBM Platinum Partner Trophy

Mid-Range achieved Platinum Partner Status with IBM!

This is an achievement that few businesses are able to achieve, and requires dedication and success beyond industry averages.

As an IBM Platinum Partner, we have access to IBM resources and training to supplement our already vast range of knowledge and experience in IT.

Abstract Blue Image Data Connections and technology

October 29th Cybersecurity Awareness Leadership Lessons

Danny Pehar, Cybersecurity Expert and Forbes Author, teamed up with Mid-Range to deliver cybersecurity training during a recent event in Toronto, Ontario.

The event put a strong focus on security training to combat enterprise-level ransomware and fraud. Learn some of the key highlights and advice:


Copyright 2020. Mid-Range. All Rights Reserved    |    Privacy policy    |    Site Map    |    Accessibility Policy