Want to listen instead? There’s a misconception among some that Apple devices are immune from hackers. That illusion was shattered a few weeks ago when the company released two security…
Want to listen instead? The Human Element of IT We recently spoke with Chester Wisniewski, the principal research scientist at Sophos. Chet works with researchers across the globe who are…
We joined up with Acronis for the ultimate FAQ session on disaster recovery and backups for organizations. Key Takeaways: Risk / Vulnerability Assessment What’s Included Action Steps Backup Best Practices…
Much of an organization’s uptime can be contributed to its network security strategy. From reducing vulnerabilities across a threat landscape to streamlining incident response following a data breach with local…
Every year, more than 155 million individuals’ records are exposed to data breaches in the U.S. With data breaches averaging new highs of $8.64 million and U.S. companies the most…
Cloud computing was once considered a pipe dream, but has since become an integral part of the day-to-day operations of countless businesses worldwide. An estimated 92% of businesses host at…
Want to listen instead? What is one necessary aspect of IT that truly annoys users? A new study by Pindrop found that 57% of consumers are frustrated with passwords and…
Frontline Defense: How Sophos Protects Users & Businesses To officially kick off our Summer of Cyber event series, we took a behind-the-scenes look into Sophos Managed Threat Response (MTR) and…
Want to listen instead? How Can I Prevent the Follina Microsoft Vulnerability? A new Microsoft Office vulnerability dubbed “Follina” could allow cyberattackers to gain control of impacted systems. We spoke…
Want to listen instead? PR for Cybersecurity Incidents When IT consultants discuss cybersecurity, we often talk about building walls of protection for clients. We recently invited Mark Frederickson from SnappConner…
This month, Tyler Rasmussen, VP of Cybersecurity @ Executech, and John Zanni, CEO @ Acronis SCS, are coming together to discuss cybersecurity and compliance specifically for cities and towns. Topics…
Cloud computing was once considered a pipe dream, but has since become an integral part of the day-to-day operations of countless businesses worldwide. An estimated 92% of businesses host at…