
1 min read
Tek Video: The Probability of a Second Breach
If you've had a breach, statistically the likelihood of you having a second breach or more is very high.
Read MoreArticles for business leaders covering topics such as technology, cybersecurity, and compliance.
1 min read
If you've had a breach, statistically the likelihood of you having a second breach or more is very high.
Read More6 min read
The days when cybersecurity was solely the concern of IT departments are long gone.
3 min read
OneDrive and SharePoint in Microsoft 365 are popular cloud-based collaboration, productivity, and file storage solutions to help organizations share...
4 min read
Many organizations assume that moving to a cloud-based collaboration app such as Microsoft 365 or Google Workspace means email security and backup is...
1 min read
The FBI revealed in its 2022 Internet Crime Report that ransomware gangs breached the networks of at least 860 critical infrastructure organizations...
1 min read
Top 5 Cybersecurity Musts. So, what can you do?
4 min read
In today's digital age, cybersecurity has become a critical aspect of every organization's operations. Cyber-attacks can lead to financial losses,...
1 min read
The cyber insurance market is getting stricter with its application questions and requirements.
2 min read
The average time it takes to identify a breach is 197 days. That's crazy. And then the average time to contain a breach is 69 days.
1 min read
Microsoft works off what is called a shared responsibility model. The message is simple, Microsoft is responsible for its cloud, and end-users and...
1 min read
Cybersecurity is much more than the tools.
1 min read
So here's the critical thing, the myth. And I touched on it a minute ago.
1 min read
Hacking people, not technology.
4 min read
Have you heard of a cybersecurity tabletop exercise or tabletop drill?
1 min read
Microsoft works off what is called a shared responsibility model. The message is simple, Microsoft is responsible for its cloud, and end-users and...
1 min read
Another big, game-changing element of ransomware is that you don't have to be a hacker. You don't even have to have any technical expertise.
6 min read
“If it ain’t broke, don’t fix it.” But is this approach harming your business?
1 min read
Tek Video: Endpoint Security vs. Antivirus Endpoint Security and Antivirus. There's a big difference.
6 min read
10 Considerations for Hiring In-house IT vs Partnering with an MSP Does your business’s IT management need an upgrade?Are you wondering why your...
5 min read
Why Your IT Provider Should be SOC 2 Accredited A SOC 2 audit isn’t just a one-time exercise. The audit must be completed yearly, inspecting...
5 min read
83% of small and medium-sized businesses are not financially prepared to recover from a cyberattack.
2 min read
You’ve probably heard about email encryption and maybe you’ve even wondered when it’s necessary.
3 min read
In the last year, businesses and agencies sent a record 6.3 million data breach notices to Washingtonians.
3 min read
Researchers at Barracuda Networks analyzed millions of emails across thousands of companies in 2021 and found that on average, an employee of a small...
4 min read
According to IBM’s 2021 Cost of a Data Breach Report, the healthcare industry suffered the highest average cost of a data breach for the 11th year in...
3 min read
Prices are going up. Are you prepared? Update: Microsoft just extended the grace period to lock in Feb 2022 pricing. March 14th is the last day to...
2 min read
Let’s face it, our world is filled with regularly occurring data breaches and cybersecurity events. Organizations need assurances that the companies...
2 min read
Cyber Resilience. Can companies like Vestas, which had a ransomware attack on November 19th, rebound from a cyberattack? Watch Now!
3 min read
The threat of a cyber-attack is too high, and the consequences can be devastating. At this point, it's important for all businesses to have cyber...
3 min read
The FBI’s Internet Crime Complaint Center (IC3) saw a 69% increase in the number of cybercrime reports it received in 2020 compared to 2019. On...
3 min read
The cyber insurance market is getting stricter and for many organizations, it’s getting more challenging and expensive to secure coverage.
2 min read
Who is hiding in your network? Threat hunting was created out of a necessity among organizations to stay on top of advanced persistent threats (APTs).
1 min read
By Byron Martin | HFG Trust Connect Magazine - October 2021 | View Article When the COVID-19 pandemic hit, in some ways the timing was a blessing.
6 min read
Microsoft SharePoint celebrated its 20th birthday on March 27th, 2021! And it’s come a long way over the past 20 years.
3 min read
We’ve witnessed a shift in how we work to that of a hybrid workforce, a blended workforce comprising of both remote and in-office work. As such,...
4 min read
Hackers initiate 2,244 attacks per day. Every link clicked, email opened, app downloaded, and network joined is an opportunity for hackers to...