How to Create a Transparent IT Partnership – And Why It Matters

February 11, 2020

More than once, this has happened to us. We’re in a meeting with a potential client. It reaches th..

Your 2020 Cybersecurity Strategy: 5 Factors to Focus On

January 2, 2020

We don’t know what the new year will bring, but we’re certain cyberattacks are on the horizon. T..

Risk from Your IT Vendors? Understating 3rd Party Vulnerabilities

December 6, 2019

Consider the following scenario: Budget was your top priority during your search for a payroll provi..

2 Ways to Improve Your Business’ Security after Arizona Data Breaches

October 30, 2019

Cybercriminals are driven by a simple goal: exploit data for personal gain. In pursuit of this, they..

Uncover the Real Costs of the Cloud & Learn How to Manage Migrations

October 1, 2019

Back-of-the-napkin math is useful for quickly detailing an idea and expressing costs in simple terms..

My Key Security Takeaways from 2019’s Largest Hacker Conference

August 27, 2019

Recently, I attended DEF CON, the largest hacking conference in the world, and saw how cybercriminal..

How to Ensure a Stress-Free Microsoft End-of-Life Migration

August 5, 2019

Continuing to use Microsoft Windows 7 or Windows Server 2008 after January 14, 2020, is akin to crea..

You Don’t Deserve Bad IT Support

June 28, 2019

Change is disruptive. It introduces unknown elements into our lives and rather than face uncertainty..

Why Risk-Informed Decision-Making Matters and How to Get Started

May 31, 2019

60 gallons of water cascading down on your server cabinet is hardly an ideal situation. But if you h..