Resources by Paul Breitenbach
With nearly 20 years of experience designing enterprise-grade IT solutions, Paul specializes in supporting organizations that cannot afford downtime. Before becoming our CIO, he served as CIO of WorldwideIT, a Compass company, where he led large-scale infrastructure, cloud, and security initiatives for highly regulated industries.
Yeah… nothing here.
Try a different filter. A quick tweak should get you there.
The Executive Guide to Network Performance & Telecom Stability
Optimize your network performance and telecom stability with CompassMSP's ...
The Case for an Annual Technology Plan in an Unpredictable Economy
Unlock predictable IT costs and optimize your budget with an annual technology ...
Managed vs. Co-Managed IT: Which Support Model is Right for Your Business?
Discover the best IT support model for your business: Fully Managed or ...
MSP vs. MSSP vs. vCISO: The Three Pillars of a Resilient Business
Learn the key differences between MSPs, MSSPs, and vCISOs, and discover how to ...
The Five Steps to Implement Cloud Solutions: A Guide for Business Leaders
Guide for business leaders on implementing cloud solutions, emphasizing ...
How Much Time Does Cloud Integration Take? Key Factors Small Business Leaders Should Consider
Discover how long cloud integration takes for small businesses. Learn how ...
How Much Does Cloud Computing Cost for a Small Business?
Cloud computing costs for small businesses vary based on usage, storage, and ...
Why Small and Mid-Sized Businesses Are Moving to the Cloud... and Why You Should Too
Discover why small to mid-sized businesses are migrating to the cloud to reduce ...
Cloud vs. On-Premises: Which One Makes Sense for Your Business?
Explore the cloud vs. on-premises debate to choose the best IT infrastructure ...
Cloud Computing for Small Businesses: 8 Key Benefits Every CEO Should Know
Discover the top eight benefits of cloud computing for small businesses. Learn ...
How Does Cloud Computing Work for Small and Mid-Sized Businesses? The Basics You Need to Know
Learn how cloud computing for small businesses works. Discover key strategies ...
What Is the Cloud? A Simple Guide for Small and Mid-Sized Businesses
What is the cloud? Implementing cloud solutions helps small businesses boost ...
How to Conduct a Cybersecurity Audit
Discover the essential steps to conduct a cybersecurity audit. Ensure ...
Understanding Cybersecurity Risks in 2025: A Guide for Small and Mid-Sized Businesses
Stay ahead of cybersecurity risks in 2025 with insights on emerging threats. ...
Fortifying Your Defenses: What to Know Before Partnering with an MSP
Discover how partnering with an MSP fortifies your business against technology ...
Rules, Regulations, and More: Staying Compliant in a Changing World
Learn why staying compliant with cybersecurity regulations is crucial in ...
How to Reduce the Risk (and Cost) of Ransomware Attacks
CompassMSP (IT managed service provider and MSSP) explains "what is ransomware" ...
Avoid Interruptions to Your Business: How to Prevent Cyber Attacks
All businesses are at risk for a cyber attack. Reduce your risk and prevent ...
What Are QR Code Scams (Quishing)?
QR code scams involve use of QR codes to deceive individuals into revealing ...
The CompassMSP Cybersecurity Checklist
Hackers don't use PTO days. To get you started, here is the compassmsp 2023 ...
Protect your business. Have Minimum-Security Standards in Place.
Adhering to MSS (minimum-security standards) in your business can help you ...
CompassMSP Presents: Ransomware - A Deeper Dive Webinar
Ransomware - A deeper dive webinar will help to understand what this malware is.
CompassMSP Presents: Excel 101 - Webinar
Join our free Excel 101 webinar to learn essential skills for beginners, ...
CompassMSP Presents: Cybersecurity Awareness Training
Cybersecurity Awareness Training webinar will help you understand what kind of ...
CompassMSP Presents: Microsoft Outlook- Beyond the Basics
Unlock the advanced features of Microsoft Outlook in our upcoming webinar. ...
Cybersecurity Checklist: Vacation Edition
Hackers don't use PTO days. To get you started, here is a cybersecurity ...
The Cost of Downtime in Business
Did you know that a lack of productivity directly correlates to a decrease in ...
How to Search (for Everything) in Microsoft Teams
Searching for chats in Microsoft Teams is straightforward. But there's a lot of ...
Five Essential Tactics to Defend Your Network Against Hackers
How do hackers actually get into your network and wreak havoc? Movies and TV ...
How to Transfer a Teams Meeting to Another Device
Have you ever joined a Teams meeting on one device, but then needed to join ...
How to Start an Instant Meeting in Microsoft Teams
Start an impromptu meeting with a team or an individual on Teams? There are a ...
How To Highlight A Speaker In MS Teams
It can be difficult to focus on the main speaker. Teams has two tools that can ...
Add an Additional Person to a Scheduled Teams Meeting in Session
Have you ever needed to add someone to a Teams meeting after it’s already ...
Managed vs. Co-Managed IT: Which Support Model is Right for Your Business?
Discover the pros and cons of Fully Managed IT vs. Co-Managed IT to optimize ...