
Phone / Fax / Email
Headquarters / Boston
- Street Address
4 Bellows Rd / 2nd Floor
Westborough, MA 01581 - Mailing Address
PO Box 1129
Westborough, MA 01581-6129
Regional Offices
- Southeast Office
120 W Trinity Pl
Decatur, GA 30030
4 Bellows Rd / 2nd Floor
Westborough, MA 01581
PO Box 1129
Westborough, MA 01581-6129
120 W Trinity Pl
Decatur, GA 30030
This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.
OK View Privacy PolicyWe may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.
We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
These cookies collect information that is used either in aggregate form to help us understand how our website is being used or how effective our marketing campaigns are, or to help us customize our website and application for you in order to enhance your experience.
If you do not want that we track your visit to our site you can disable tracking in your browser here:
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds:
The following cookies are also needed - You can choose if you want to allow them:
Email Cybersecurity Risks: 3 Things to Know
/in GeneralAs we have shared in the past, cyber attacks constantly change and evolve. We face new attack vectors, or methods, and old methods reappear. Email remains the most common starting place for cyber attacks. These attacks may be direct, or they may be the first step of a larger attack. Over the last few months, […]
Your 2025 IT Checklist – The Next 3 Items
/in GeneralThe Next 3 Items on Your 2025 IT Checklist As we move into 2025, our businesses face a new set of challenges. Political and economic changes, rapidly emerging technologies, and increasing security threats will all demand our attention. Where we focus, and the decisions we make, will impact our businesses, customers, and employees. Is your […]
The First 3 Items on Your 2025 IT Checklist
/in GeneralAs we move into 2025, our businesses face a new set of challenges. Political and economic changes, rapidly emerging technologies, and increasing security threats will all demand our attention. Where we focus, and the decisions we make, will impact our businesses, customers, and employees. Is your 2025 IT Checklist ready to help? Your information technology services remain […]
Picking the Right Google Workspace Subscription for Your Business
/in GeneralTo meet widely varying customer needs, Google offers five core subscription options spread over two tiers. For larger organizations with frontline and deskless information workers, Google offers additional, specialized license options. If you are looking at a Google Workspace subscription for the first time, considering an upgrade, or looking for Gemini AI features, you’ll want […]
Google Workspace: Gemini AI Features and Pricing Changes
/in General, NewsUpdated January 22, 2025, at 2:00 pm et: See the easier to read chart and text that is in bold italics. On January 15, 2025, Google announced a major shift for Google Workspace. Going forward, all Google Workspace licenses will include Gemini AI features and functions. Specific capabilities will vary by license type. While customers […]
Leadership Thoughts: Noteworthy Blog Posts – Jan ’25
/in Blog, GeneralAs small business owners and leaders, you carry the responsibility for the direction and success of your business. And while Cumulus Global provides managed cloud services that help you thrive and grow, we understand your responsibilities are broader than just IT. Here is a curated list of blog posts from trusted experts and thought leaders that […]
Be Ready for 3 Things in 2025
/in GeneralAs we head into the new year, we face an uncertain business landscape. Politics, the economy, and technology advances create new tech-related challenges and opportunities. As you make your plans, be ready for these 3 things in 2025. Windows 10 End of Life Windows 10 reaches its end-of-life on October 14, 2025. As of this […]
Business Email Compromise: The Second Costliest Crime
/in GeneralOriginally Posted December 9, 2024. Updated to add a link to a related article published by the Washington Post. A $2.9 Billion Problem With 2023 adjusted losses exceeding $2.9 Billion, the FBI’s 2023 Internet Crime Report identifies BEC attacks as the second-costliest type of crime. In a recent survey by CertifID, more than half of the […]
PC Continuity Means Business Continuity
/in GeneralIn today’s fast-paced business world, the ability to maintain continuous PC operations is crucial for your business. With limited resources and manpower, you cannot afford to lose data or prolonged downtime. A crashed laptop can take 4 or more days to repair (or replace) and rebuild. The impact on your ability to serve your clients, […]
Prepare for Windows 10 End of Life and Windows 11
/in GeneralA Guide: From Windows 10 End of Life to Windows 11 Support for Windows 10 ends on October 14, 2025. After this date, Microsoft will no longer provide: Free software updates, including updated or new features Security patches and fixes Technical assistance Although you can continue to use Windows 10, doing so dramatically increases your […]
Google Jamboard Shutdown – Save Your Jams
/in GeneralAs previously announced, Google is shutting down Jamboard on December 31, 2024. Even if you never bought a physical Jamboard, the Jamboard app has bounced around the Google Workspace ecosystem for a while as both a stand-alone app (jamboard.google.com) and as the whiteboarding tool in Google Meet. Jamboard’s end-of-life is December 31, 2024. This is […]
What is Pen Testing and Why You Should Care
/in GeneralCyber threats are evolving at an alarming rate, posing significant risks to your business. Penetration testing, commonly referred to as “pen testing,” is becoming a vital, proactive tool for assessing your risks. Pen testing simulates a cyber attack on a computer system aimed at identifying vulnerabilities and testing the security of IT systems. Pen testing […]
Google Gemini Licensing Explained
/in GeneralGoogle’s recent announcement that Google Gemini is now a core service within Google Workspace has led to some confusion regarding the distinction between the Gemini App and Gemini for Google Workspace and your Gemini licensing options. This blog post provides clarity on the products and their pricing. The Gemini App The Gemini App runs at […]
Preparing for Your Cyber Insurance Renewal
/in GeneralAs you approach your annual cyber insurance renewal, you can take specific steps to ensure you have appropriate coverage and reasonable premiums. The cyber insurance market has matured greatly over the past two years and continues to evolve rapidly. Insurers have become significantly more savvy regarding risks, protections, recovery costs, and potential liabilities. As a […]
Understanding the Google Class Action Lawsuit Notice
/in General, NewsBeginning on September 23, 2024, Google Workspace administrators began receiving notices from Google Operations related to a class action lawsuit filed against Google in 2020. This Service Alert blog post summarizes the information and discusses next steps as they relate to users with Google Workspace accounts. Background In July 2020, a class action lawsuit was […]
Prevent Your Email From Being Pushed Aside or Blocked
/in GeneralWith the ever-present nuisance of spam and threats of cyber attacks, email services continue to add features and protections. Some of these will prevent your email from being delivered, and others will prevent your message from being seen. Here are 3 actions you need to take so your messages arrive and are seen. Ensure Your […]
3 IT Trends We See Now
/in GeneralWorking with hundreds of small and midsize businesses, we often see trends in IT interests, plans, and initiatives. Given all the hype, we expected to see Generative AI as a big trend this fall. While our clients are interested in it and beginning to use it, Generative AI is not among the top three trends […]
ALERT: Threatening Emails are Spiking
/in GeneralIn the last 72 hours, our clients have reported an alarming increase in threatening emails. These emails contain enough personal information to legitimately trigger worry, fear, and in some cases, panic. This post covers three types of threatening messages and how to respond. The Attacks This type of attack is known as a “Exposure Threat” […]
5 Cybersecurity Standards for Small and Midsize Businesses
/in GeneralAs small and midsize business leaders, we understand the need to comply with regulatory and industry requirements. We also want and need our IT services to support our business priorities and fit within our budget. So how much cybersecurity is enough? Our cyber insurance partner, Datastream, analyzed policies and coverages for nearly 8 million businesses across […]
Best Practice – 3 Ways to Get Better IT Bids Quotes
/in GeneralA common statement we hear from sales experts and consultants is that 60% of IT buyers believe that they have found the solution they need before they contact their first vendor. While we are not sure of the accuracy of this claim, anecdotally we see more small and midsize businesses asking for IT quotes for […]