Byron Martin

encryption

2 min read

How to Send an Encrypted Email in Microsoft Outlook

You’ve probably heard about email encryption and maybe you’ve even wondered when it’s necessary.

Read More
data breach

3 min read

Washington State Attorney General 2021 Data Breach Report Findings

In the last year, businesses and agencies sent a record 6.3 million data breach notices to Washingtonians.

Read More
cyber attack

3 min read

Small Businesses are More Likely to be Targets of Cyber Attacks

Researchers at Barracuda Networks analyzed millions of emails across thousands of companies in 2021 and found that on average, an employee of a small...

Read More
data breach

4 min read

5 Ways to Keep Your Dental Practice Safe from a Data Breach

According to IBM’s 2021 Cost of a Data Breach Report, the healthcare industry suffered the highest average cost of a data breach for the 11th year in...

Read More
Microsoft NCE

3 min read

Microsoft 365 Price Increase March 15th

Prices are going up. Are you prepared? Update: Microsoft just extended the grace period to lock in Feb 2022 pricing. March 14th is the last day to...

Read More
SOC 2

2 min read

Why SOC 2 Certification is Valuable

Let’s face it, our world is filled with regularly occurring data breaches and cybersecurity events. Organizations need assurances that the companies...

Read More
cyber resilience

2 min read

Uptime Podcast with Teknologize: Cyber Resilience

Cyber Resilience. Can companies like Vestas, which had a ransomware attack on November 19th, rebound from a cyberattack? Watch Now!

Read More
cyber insurance

3 min read

Understanding Cyber Insurance

The threat of a cyber-attack is too high, and the consequences can be devastating. At this point, it's important for all businesses to have cyber...

Read More
cyber insurance

3 min read

The Future of Cyber Insurance

The FBI’s Internet Crime Complaint Center (IC3) saw a 69% increase in the number of cybercrime reports it received in 2020 compared to 2019. On...

Read More
cyber insurance

3 min read

Why Cyber Insurance is Critical

The cyber insurance market is getting stricter and for many organizations, it’s getting more challenging and expensive to secure coverage.

Read More
threat hunting

2 min read

Threat Hunting. Who is Hiding in Your Network?

Who is hiding in your network?

Read More
Information Technology

1 min read

Connect Magazine - Technology

By Byron Martin | HFG Trust Connect Magazine - October 2021 | View Article When the COVID-19 pandemic hit, in some ways the timing was a blessing.

Read More
Microsoft SharePoint

6 min read

Benefits of Using Microsoft SharePoint

Microsoft SharePoint celebrated its 20th birthday on March 27th, 2021! And it’s come a long way over the past 20 years.

Read More
Microsoft CSP

3 min read

Benefits of Partnering with a Microsoft CSP

We’ve witnessed a shift in how we work to that of a hybrid workforce, a blended workforce comprising of both remote and in-office work. As such,...

Read More
endpoint security

4 min read

Endpoint Security vs. Antivirus Software

Hackers initiate 2,244 attacks per day. Every link clicked, email opened, app downloaded, and network joined is an opportunity for hackers to...

Read More
SharePoint

1 min read

OneDrive vs. SharePoint. What’s the Difference?

Microsoft announced in its latest quarterly earnings release that the number of Microsoft 365 subscribers has increased to 50.2 million from January...

Read More
information technology

2 min read

Cybersecurity is not Information Technology (IT)

Your cybersecurity has to win every time, but the attacker only needs to win once.

Read More
SaaS Applications

3 min read

Must Have Google Workspace Security Configurations

Migrations to the cloud are moving faster than ever. 78% of businesses will be run almost entirely on SaaS Applications.

Read More
security configurations

4 min read

Must Have Microsoft 365 Security Configurations

1 in 4 businesses reported ransomware attacks on cloud data.

Read More
IoT

4 min read

IoT Medical Device Security

Forbes estimates 646 million IoT devices were used in hospitals, clinics, and medical offices in 2020. The Internet of Things has transformed the way...

Read More
hack

4 min read

Hacked Colonial Pipeline Ransomware Attack Forces Shutdown

The shutdown has caused panic in many southeastern states.

Read More
cybersecurity

3 min read

5 Cybersecurity Questions to Ask Your IT Company

60 percent of small businesses that are victims of a cyber-attack go out of business within six months.

Read More
cybersecurity

6 min read

21 Cybersecurity Horror Stories and Stats!

Cybercrime is the greatest threat to every company in the world. And Most companies take nearly 6 months to detect a data breach, even major ones.

Read More
Microsoft Exchange

5 min read

The Microsoft Exchange Attack Isn’t Going Away Anytime Soon

Estimates put the number of servers compromised by the attack in the hundreds of thousands globally.

Read More
HIPAA

4 min read

HIPAA Breach Notification Rule

642 healthcare data breaches of 500 or more records were reported in 2020, according to HIPAA Journal. That equates to 1.76 data breaches reported...

Read More
microsoft exchange

3 min read

Microsoft Exchange Hack. Patch Now!

Urgent patching necessary. Microsoft continues to see increased attacks targeting unpatched systems by multiple malicious actors beyond Hafnium...

Read More
spear phishing

4 min read

7 Reasons Why Spear Phishing Attacks are Successful

Phishing/social engineering is the #1 cause of data breaches and the primary delivery method for ransomware.

Read More
Spam Email

3 min read

Why You Need Spam Email Filtering

According to Help Net Security, 90% of successful cyberattacks occur through email-based attacks. Additionally, 1 out of every 8 employees shares the...

Read More
technology

1 min read

Technology Doesn't Have to be Frustrating

54 percent of SMBs report the increasing complexity of IT as the main reason for outsourcing their IT. 1 in 4 SMBs lost revenue due to IT-related...

Read More
wind farm

1 min read

Teknologize and Uptime Podcast on IT and Cybersecurity for Wind Farms

Interesting conversation around the IT and Cybersecurity demands of the modern wind farm and the critical technology running behind the scenes....

Read More
Data Breach

2 min read

Data Breach Notifications Laws for Oregon State

What does Oregon law require you to do, and who are you required to notify? What happens if you don’t notify anyone?

Read More
Email Security

1 min read

Email Security: 4 Simple Tips to Keep Your Business Email Secure

There are over 300 million fraudulent sign-in attempts to Microsoft cloud services every day.

Read More
Business Continuity and Downtime

2 min read

Business Continuity: How to Be Prepared for Downtime or an IT Disaster

Flood. Power outage. Cyberattack. Supply chain failure or a disgruntled employee. Disruptions to your business can happen at any moment causing...

Read More
BYOD Mobile Device Management

8 min read

BYOD: Let’s Talk about Mobile Device Management

87% of companies are dependent to some extent on their employee’s ability to access mobile business apps from their personal smartphones. (Source:...

Read More
Data Breach Notification

2 min read

Data Breach Notifications Laws for Washington State

New data breach protections give Washington one of the most robust data breach notification policies in the country.

Read More
Incident Response Email Breach

4 min read

Incident Response: How to Respond to an Email Breach

Business Email Compromise earned hackers $1.3 billion in a year. (Source: Internet Crime Complaint Center)

Read More