Cybersecurity Blog

Cybersecurity for SMBs and MSPs

In light of the recent Kaseya supply-chain attack, the relationship between IT/manged services providers and small to mid-sized businesses has come to the forefront. Responsibility…

Shadow IT: Google Chrome Remote Desktop

I’ve seen quite a bit of Google Chrome Remote Desktop in the wild as of late, and to me it presents some challenges worth talking…

How to justify spending on cybersecurity

“An ounce of prevention is worth a pound of cure.” Here are some useful bits of info that might help justify cybersecurity program improvements: According…

Meraki FIPS Compliance

For quite some time this has been difficult to find. NIST SP 800-171 and the CMMC require the use of FIPS validated cryptography when protecting…

CUI Resources

For those looking for information on CUI training or additional CUI resources, here are a few helpful links: DoD Mandatory Controlled Unclassified Information (CUI) Training…

Multi-factor authentication

Background You might see it referred to as 2FA, MFA, or 2-step, but it all refers to having an additional authentication mechanism when we log…

Is this file safe?

IT professionals and power users employ all sorts of utilities for daily tasks.  Often, a quick search will suggest several options that might work for…

Vulnerability management: is patching enough?

A great example popped up today regarding truly effective vulnerability management. Many businesses have automated patching tools, and some may be under the impression that…

Secure Your Business Today

Cybersecurity isn’t something to put off—it’s a critical part of your business strategy. Whether you need help with compliance, risk management, or ongoing security, we’re here to help.

Let’s start securing your future!

Scroll to Top