Tek Video: Cyber Resilience

By Byron Martin | May 30, 2023
The FBI revealed in its 2022 Internet Crime Report that ransomware gangs breached the networks of at least 860 critical infrastructure organizations..

Tek Video: Top 5 Cybersecurity Musts

By Katrina Wahlbrink | May 25, 2023
Top 5 Cybersecurity Musts. So, what can you do?

The Cybersecurity Divide: Understanding the Cybersecurity Poverty Line

By Byron Martin | May 22, 2023
In today's digital age, cybersecurity has become a critical aspect of every organization's operations. Cyber-attacks can lead to financial losses,..

Tek Video: Cybersecurity Insurance Application Questions

By Byron Martin | May 16, 2023
The cyber insurance market is getting stricter with its application questions and requirements.

Tek Video: The Hacker Timeline

By Byron Martin | May 8, 2023
The average time it takes to identify a breach is 197 days. That's crazy. And then the average time to contain a breach is 69 days.

Tek Video: Myth - My Data is Safe in the Cloud

By Byron Martin | May 4, 2023
Microsoft works off what is called a shared responsibility model. The message is simple, Microsoft is responsible for its cloud, and end-users and ..

Tek Video: Myth - I'm Safe, I Have Current Cybersecurity Tools

By Byron Martin | May 1, 2023
Cybersecurity is much more than the tools.

Tek Video: Myth - I Can Recover from Backups

By Byron Martin | April 24, 2023
So here's the critical thing, the myth. And I touched on it a minute ago.

Tek Video: Social Engineering - Hacking People not Technology

By Byron Martin | March 28, 2023
Hacking people, not technology. 

What is a Cybersecurity Tabletop Exercise?

By Byron Martin | March 23, 2023
Have you heard of a cybersecurity tabletop exercise or tabletop drill?

Tek Video: Microsoft 365 Security is a Shared Responsibility

By Byron Martin | March 14, 2023
Microsoft works off what is called a shared responsibility model. The message is simple, Microsoft is responsible for its cloud, and end-users and..

Tek Video: Ransomware as a Service (RaaS)

By Byron Martin | February 28, 2023
Another big, game-changing element of ransomware is that you don't have to be a hacker.  You don't even have to have any technical expertise. 

Break Free From the Break-fix IT Model

By Byron Martin | February 23, 2023
“If it ain’t broke, don’t fix it.” But is this approach harming your business?

Tek Video: Endpoint Security vs. Antivirus

By Byron Martin | February 15, 2023
Tek Video: Endpoint Security vs. Antivirus  

10 Considerations for Hiring In-house IT vs Partnering with an MSP

By Byron Martin | February 13, 2023
  10 Considerations for Hiring In-house IT vs Partnering with an MSP   Does your business’s IT management need an upgrade?Are you wondering why your..

Why Your IT Provider Should be SOC 2 Accredited

By Byron Martin | January 20, 2023
Why Your IT Provider Should be SOC 2 Accredited    A SOC 2 audit isn’t just a one-time exercise. The audit must be completed yearly, inspecting..

Six Ways to Build Cyber Resilience

By Byron Martin | October 10, 2022
  83% of small and medium-sized businesses are not financially prepared to recover from a cyberattack. 

How to Send an Encrypted Email in Microsoft Outlook

By Byron Martin | July 28, 2022
You’ve probably heard about email encryption and maybe you’ve even wondered when it’s necessary.

How to Transfer Microsoft Authenticator to a New Phone

By Byron Martin | June 2, 2022
  Using multi-factor authentication (MFA) is one of the easiest and most successful ways to increase the security for your accounts. This can prevent..

Washington State Attorney General 2021 Data Breach Report Findings

By Byron Martin | June 1, 2022
In the last year, businesses and agencies sent a record 6.3 million data breach notices to Washingtonians.

Small Businesses are More Likely to be Targets of Cyber Attacks

By Byron Martin | April 19, 2022
Researchers at Barracuda Networks analyzed millions of emails across thousands of companies in 2021 and found that on average, an employee of a small..

5 Ways to Keep Your Dental Practice Safe from a Data Breach

By Byron Martin | March 23, 2022
According to IBM’s 2021 Cost of a Data Breach Report, the healthcare industry suffered the highest average cost of a data breach for the 11th year in..

Why SOC 2 Certification is Valuable

By Byron Martin | February 16, 2022
Let’s face it, our world is filled with regularly occurring data breaches and cybersecurity events. Organizations need assurances that the companies..

How to Move Google Authenticator to a New Phone Without Losing Access

By Byron Martin | February 9, 2022
If you use Google Authenticator for multi-factor authentication the authenticator settings are not transferred across devices for security purposes...

Uptime Podcast with Teknologize: Cyber Resilience

By Byron Martin | December 28, 2021
Cyber Resilience. Can companies like Vestas, which had a ransomware attack on November 19th, rebound from a cyberattack? Watch Now!

Understanding Cyber Insurance

By Byron Martin | December 20, 2021
The threat of a cyber-attack is too high, and the consequences can be devastating. At this point, it's important for all businesses to have cyber..

The Future of Cyber Insurance

By Byron Martin | December 7, 2021
The FBI’s Internet Crime Complaint Center (IC3) saw a 69% increase in the number of cybercrime reports it received in 2020 compared to 2019. On..

Why Cyber Insurance is Critical

By Byron Martin | November 29, 2021
The cyber insurance market is getting stricter and for many organizations, it’s getting more challenging and expensive to secure coverage.

Threat Hunting. Who is Hiding in Your Network?

By Byron Martin | November 10, 2021
Who is hiding in your network?

Connect Magazine - Technology

By Byron Martin | October 15, 2021
By Byron Martin | HFG Trust Connect Magazine - October 2021 | View Article When the COVID-19 pandemic hit, in some ways the timing was a blessing.

Benefits of Partnering with a Microsoft CSP

By Byron Martin | August 11, 2021
We’ve witnessed a shift in how we work to that of a hybrid workforce, a blended workforce comprising of both remote and in-office work. As such,..

Endpoint Security vs. Antivirus Software

By Byron Martin | August 3, 2021
Hackers initiate 2,244 attacks per day. Every link clicked, email opened, app downloaded, and network joined is an opportunity for hackers to..

Cybersecurity is not Information Technology (IT)

By Byron Martin | June 23, 2021
Your cybersecurity has to win every time, but the attacker only needs to win once.

Must Have Google Workspace Security Configurations

By Byron Martin | June 8, 2021
Migrations to the cloud are moving faster than ever.   78% of businesses will be run almost entirely on SaaS Applications.

IoT Medical Device Security

By Byron Martin | May 25, 2021
Forbes estimates 646 million IoT devices were used in hospitals, clinics, and medical offices in 2020.   The Internet of Things has transformed the..

Hacked Colonial Pipeline Ransomware Attack Forces Shutdown

By Byron Martin | May 13, 2021
The shutdown has caused panic in many southeastern states.