Technology Guidance for Business Leaders

Subscribe to our blog to stay informed!

Spear Phishing: How to Protect Your Business

In the past, using strong passwords was enough to keep accounts secure and hackers at bay. This is no longer the case, and cyber security services require a lot more than...


What is Shadow IT - And How You Can Control It

In the past, IT departments were able to control almost all technology decisions, along with who was allowed to use what application or service.But then came the cloud....


Is Your Business Ready for a Ransomware Attack?

Of all the malware threats in the world, ransomware remains the number-one choice of cybercriminals. And it’s a growing threat. Cybercrime Magazine estimates that malware...


5 Ways to Secure Google Drive for Business Use

If your business uses Google Workspace (formerly G Suite), then you have at least a nodding acquaintance with Google Drive.

Google Drive, of course, is Google’s storage...


6 Tips for Improving Cloud Computing Security

Almost every business you can think of is using public hybrid cloud services for many of their critical business applications. Unfortunately as we head into 2021, ...


Cyber Insurance: Everything You Need to Know About Your Best Defense

How much will a data breach cost your business?

It’s not pretty: The average total cost of a data breach in 2020 was USD $3.86 million. The most expensive country was the...


How Cybersecurity Managed Services Improve and Simplify NIST Compliance

If you are a federal government contractor wanting to land lucrative contracts with the Department of Defense and other large federal agencies, you must up your...


Should You Adopt a Zero Trust Security Model for Your Remote Workforce?

If you have a remote workforce (and, let’s face it, who doesn’t these days), you are likely concerned about how to secure your networks and data against intrusions by...


The Colonial Pipeline Hack: How To Protect YOUR Business!

Last week our news feeds were dominated yet again by another major cybersecurity incident.

This time, it was the ransomware hack on Colonial Pipeline which caused a major...


How A Managed Security Service Provider (MSSP) Provides Cyber Defense

A managed security service provider (MSSP) could be one of your best business investments. Why? The most obvious reason is the escalating cyber incidents which threaten...


How to Test A Suspicious Link or URL - Cool New Tool!

Ever wonder if a link in an email is legitimate? It’s not getting any easier to tell when a website, link, or attachment is ‘phishy’ - meaning if it’s legit or something...


How Will HITECH and HIPAA Regulations Affect Your Business?

Back in February of 2009, the Obama Administration put the HITECH act into law, primarily as a means to update HIPAA which was started in 1996, and needed to be updated....