Please enable JavaScript.
Coggle requires JavaScript to display documents.
GB Tech 2018-2019 Content Map (Months 1-6 | Managed Services (Month 1 |…
GB Tech
2018-2019 Content Map
Months 1-6 | Managed Services
Month 2 |
Help Desk Services
.
Email 2 | Blog 1
Newsletter
Email 1 | Existing LP
Blog 1 | [Guide] What to look for in a work computer
Blog 2 | [Checklist] Slow WiFi? Try this.
Month 3 | Managed Services
.
Email 2 | Cornerstone 1
Newsletter
Email 1 | Existing WP
Blog 1 | [Guide] The tech you need to run a business
Blog 2 | [Guide] X productivity hacks for your company
.
Month 4 | IT Budgeting
.
Email 2 | Blog 2
Newsletter
Email 1 | Blog 1
Blog 1 | [Guide] X steps to creating the perfect IT budget
Blog 2 | [Guide] X ways to save money in IT
Month 1 | Business Continuity
.
Email 2 | Existing WP
Newsletter
Email 1 | Existing LP
Blog 1 | [Guide] How to create the perfect BDR plan
Blog 2 | [Knowledge] How expensive is downtime, anyway?
Cornerstone 1 | Your go-to guide for total IT control
Month 5 | IT Consulting
.
Email 1 | Blog 1
Email 2 | Cornerstone 1
Newsletter
Blog 1 | [Knowledge] X things IT consulting does for your business
Blog 2 | [Knowledge] What do IT consultants do?
Month 6 | Cloud
.
Email #1 | Existing WP
Newsletter
Email #1 | Existing LP
Blog 1 | [Guide] X common cloud misconceptions
Blog 2 | [Knowledge] What is cloud computing, really?
Months 7-12 | IT Security
Month 10 |
Application Security
Blog 2 | [Guide] X tips for better application security
Blog 1 | [Knowledge] 2019 application security trends and predictions
.
Email 2 | Blog
Newsletter
Email 1 | Existing LP
Month 7 | Security as a Service (SOC)
.
Email 2 | Blog 1
Newsletter
Email 1 | New LP
Blog 2 | [Guide] X common endpoints you should be protecting
Blog 1 | [Guide] X helpful tips to safe web browsing
New LP | SOC
Cornerstone 2 | Your go-to guide for healthy IT security
Month 11 |
Professional Network Services
.
Email 2 | Existing WP
Newsletter
Email 1 | Existing LP
Blog 2 |[Knowledge] Are you seeing the whole IT picture?
Blog 1 | [Guide] How to keep your network secure
Month 8 | IT Security Audits
.
Email 2 | Blog 2
Newsletter
Email 1 | Blog 1
Blog 2 | [Guide] X steps to maximize network security
Blog 1 | [Guide] The best practices for IT security audits
Month 12 | Virtualization
.
Email 2 | Cornerstone 2
Newsletter
Email 1 | New LP
Blog 1 | [Guide] X ways to reduce business IT costs
Blog 2 | [Knowledge] Should you virtualize?
New LP | Virtualization
Month 9 | IT Infrastructure
.
Email 2 | Cornerstone 2
Newsletter
Email 1 | New LP
Blog 1 | [Guide] How to set up your IT to meet your business goals
Blog 2 | [Guide] Your guide to perfect cable management
New LP | IT Infrastructure