“I’m alright”, he says. Let’s say he has Kenny Log-ins. He’s a business owner whom I know socially, but not well. He’s in a long-term contract with a large & well-known DC/Balt area MSP. When I ask him about the job his MSP is doing, the answer was, “I’m alright.” Having Kenny Log-ins is a […]
When should executives provide employees Internet Security Awareness Training (ISAT), when should employees report they suspect a breach has occurred or may be occurring, and what tools/applications can manage this process? The answer to these first two questions is simple: ‘Early and Often’. Getting your team to recognize & report security issues quickly is something […]
Five Security Tactics that don’t break the bank: In today’s digital age, securing your small business against cyber threats is paramount. Small businesses are often targeted by cybercriminals due to perceived vulnerabilities. A comprehensive IT Risk Assessment and Discovery is appropriate. However – if you want to make rapid, tangible progress, there are many ‘high-yield’ […]
- 1
- 2