The Tek Blog

Articles for business leaders covering topics such as technology, cybersecurity, and compliance.

Cybersecurity (2)

Google Maps Timeline

2 min read

Here’s What Google Maps Timeline Knows About You (And It’s More Than You Think)

It’s 10:00 p.m. – do you know where your children are? Google probably does. Thanks to Google Maps’ Timeline feature, the tech company probably knows...

Read More
software updates

2 min read

Staying Cyber-Savvy: Outsmarting Criminals with Regular Software Updates

36% of survey participants reported installing the latest updates and software as soon as they become available. Of those who reported installing the...

Read More
phishing email

2 min read

Guardians of the Inbox: How to Recognize and Report Phishing

72% of respondents reported that they checked to see whether messages were legitimate (i.e. phishing or a scam) compared to 15% who reported not...

Read More
mulltifactor authentication

1 min read

Enhance Your Online Security Now with Multifactor Authentication

In a recent National Cybersecurity Alliance survey, 57% of respondents said they have heard of multifactor authentication (MFA), but many people...

Read More
password security

2 min read

Lock It Down: The Power of Strong Passwords and Password Managers

Only 33% of individuals create unique passwords for all accounts (NCA)

Read More
cybersecurity awareness month

2 min read

CISA Kicks Off Cybersecurity Awareness Month With "Secure Our World" Campaign

October isn't just about falling leaves and pumpkin spice; it's also Cybersecurity Awareness Month, established in 2004 and dedicated to raising...

Read More
phishing

3 min read

Improve Your Cybersecurity Awareness

If you’ve turned on the news sometime during the past few years, you’ve probably heard of more than one instance where a business closed due to a...

Read More
compliance standards

2 min read

What Compliance Standards Does Your Business Need To Maintain?

Compliance standards are some of the most important things a business needs to maintain to be profitable and well-respected while staying out of...

Read More

2 min read

Prepare Your Kids For A Successful School Year: Tech Tips To Maximize Learning Potential

Back-to-school season has finally arrived, and it won’t be long before our kids are back in the classroom, learning all sorts of different subjects....

Read More
cyber breach

1 min read

Tek Video: The Probability of a Second Breach

If you've had a breach, statistically the likelihood of you having a second breach or more is very high.

Read More
cybersecurity risk management

6 min read

From the Top Down: The Importance of Cybersecurity Leadership in Mitigating Business Risks

The days when cybersecurity was solely the concern of IT departments are long gone.

Read More
SaaS

4 min read

Shielding Your Cloud: Securing M365 and Google Workspace with SaaS Protection

Many organizations assume that moving to a cloud-based collaboration app such as Microsoft 365 or Google Workspace means email security and backup is...

Read More
cyber resilience

1 min read

Tek Video: Cyber Resilience

The FBI revealed in its 2022 Internet Crime Report that ransomware gangs breached the networks of at least 860 critical infrastructure organizations...

Read More
advanced endpoint protection

1 min read

Tek Video: Top 5 Cybersecurity Musts

Top 5 Cybersecurity Musts. So, what can you do?

Read More
cybersecurity poverty line

4 min read

The Cybersecurity Divide: Understanding the Cybersecurity Poverty Line

In today's digital age, cybersecurity has become a critical aspect of every organization's operations. Cyber-attacks can lead to financial losses,...

Read More
cybersecurity insurance

1 min read

Tek Video: Cybersecurity Insurance Application Questions

The cyber insurance market is getting stricter with its application questions and requirements.

Read More
hacker timeline

2 min read

Tek Video: The Hacker Timeline

The average time it takes to identify a breach is 197 days. That's crazy. And then the average time to contain a breach is 69 days.

Read More
SaaS Protection

1 min read

Tek Video: Myth - My Data is Safe in the Cloud

Microsoft works off what is called a shared responsibility model. The message is simple, Microsoft is responsible for its cloud, and end-users and...

Read More
cybersecurity tools

1 min read

Tek Video: Myth - I'm Safe, I Have Current Cybersecurity Tools

Cybersecurity is much more than the tools.

Read More
backups

1 min read

Tek Video: Myth - I Can Recover from Backups

So here's the critical thing, the myth. And I touched on it a minute ago.

Read More
cybersecurity tabletop exercise

4 min read

What is a Cybersecurity Tabletop Exercise?

Have you heard of a cybersecurity tabletop exercise or tabletop drill?

Read More
SaaS Protection

1 min read

Tek Video: Microsoft 365 Security is a Shared Responsibility

Microsoft works off what is called a shared responsibility model. The message is simple, Microsoft is responsible for its cloud, and end-users and...

Read More
RaaS

1 min read

Tek Video: Ransomware as a Service (RaaS)

Another big, game-changing element of ransomware is that you don't have to be a hacker. You don't even have to have any technical expertise.

Read More
break-fix IT

6 min read

Break Free From the Break-fix IT Model

“If it ain’t broke, don’t fix it.” But is this approach harming your business?

Read More
Endpoint Security

1 min read

Tek Video: Endpoint Security vs. Antivirus

Tek Video: Endpoint Security vs. Antivirus

Read More
In-house IT or MSP

6 min read

10 Considerations for Hiring In-house IT vs Partnering with an MSP

10 Considerations for Hiring In-house IT vs Partnering with an MSP Does your business’s IT management need an upgrade?Are you wondering why your...

Read More

5 min read

Why Your IT Provider Should be SOC 2 Accredited

Why Your IT Provider Should be SOC 2 Accredited A SOC 2 audit isn’t just a one-time exercise. The audit must be completed yearly, inspecting...

Read More
cyber resilience

5 min read

Six Ways to Build Cyber Resilience

83% of small and medium-sized businesses are not financially prepared to recover from a cyberattack.

Read More
encryption

2 min read

How to Send an Encrypted Email in Microsoft Outlook

You’ve probably heard about email encryption and maybe you’ve even wondered when it’s necessary.

Read More
data breach

3 min read

Washington State Attorney General 2021 Data Breach Report Findings

In the last year, businesses and agencies sent a record 6.3 million data breach notices to Washingtonians.

Read More
cyber attack

3 min read

Small Businesses are More Likely to be Targets of Cyber Attacks

Researchers at Barracuda Networks analyzed millions of emails across thousands of companies in 2021 and found that on average, an employee of a small...

Read More
data breach

4 min read

5 Ways to Keep Your Dental Practice Safe from a Data Breach

According to IBM’s 2021 Cost of a Data Breach Report, the healthcare industry suffered the highest average cost of a data breach for the 11th year in...

Read More
SOC 2

2 min read

Why SOC 2 Certification is Valuable

Let’s face it, our world is filled with regularly occurring data breaches and cybersecurity events. Organizations need assurances that the companies...

Read More
cyber resilience

2 min read

Uptime Podcast with Teknologize: Cyber Resilience

Cyber Resilience. Can companies like Vestas, which had a ransomware attack on November 19th, rebound from a cyberattack? Watch Now!

Read More
cyber insurance

3 min read

Understanding Cyber Insurance

The threat of a cyber-attack is too high, and the consequences can be devastating. At this point, it's important for all businesses to have cyber...

Read More