News & Resources

How to Choose the right MSSP – 8 Criteria

The Eight Criteria for Choosing the Right MSSP Choosing a firm to handle your cybersecurity requires some planning and knowing what to ask for. Below is a checklist that you can use to understand what the eight most important factors are in choosing an MSSP:...

IT Cyber Security Policy Development

IT Cyber Security Policy Development

Why create a cyber security policy? Often, companies don’t see the need for a cybersecurity policy. There are policies in place to protect the company’s assets and data is an asset. The real need for a cybersecurity policy is simple: cybersecurity is not as simple as...

How to Sell Managed Security Services to Upper Management

How to Sell Managed Security Services to Upper Management

For better or worse, upper management doesn’t like to pay for things that don’t pay for themselves. IT affects their life, at least peripherally. When they reach out to the IT team for a new computer, someone shows up and crawls under a desk. Security is only...

Overcoming the Cybersecurity Skills Shortage

Overcoming the Cybersecurity Skills Shortage

It’s everywhere on the news: there is a cybersecurity shortage. The problem is that the threats are evolving faster than anyone had imagined. The industry is constantly training new people, but the demand is staying ahead of that. Here is a look at what the problem is...

The Ultimate Cybersecurity Guide for SMBs

The Ultimate Cybersecurity Guide for SMBs

Introduction Cybersecurity is a serious topic, it needs to be top of mind at businesses of all sizes. Websites are getting hacked, companies are losing money and information, and reputations are being damaged. This will be more than an overview; it’s designed to be a...

Healthcare and Cybersecurity. Email Security in This Industry.

Healthcare and Cybersecurity. Email Security in This Industry.

Scenic Bluffs notifies patients of security breach By County Line | Posted April 27th, 2018 | Editor’s note: Scenic Bluffs Community Health Centers prepared the following press release on its security breach in late February. Cyber attackers gained limited...

Appropriate Protection for Your Cloud Email Security Concerns.

Appropriate Protection for Your Cloud Email Security Concerns.

In this comprehensive guide to choosing email security, we’ll go over the options available and how to choose. Not every solution is for every firm, but a complete understanding of the possibilities will help you chose what is likely to work best for you. Throughout...

Cyber Security Risks for Businesses Who Do Not Have a Lot of Income.

Cyber Security Risks for Businesses Who Do Not Have a Lot of Income.

Cybersecurity essentials for small businesses Cybersecurity is one phrase that can instill everything from boredom to fear into the hearts of the people who hear it. In reality, small business cybersecurity can be a life-or-death concept. The wrong security breach at...

HIPAA and Email Security. HIPAA Standards For Email Security.

HIPAA and Email Security. HIPAA Standards For Email Security.

What is HIPAA? HIPAA (the Health Insurance Portability and Accountability Act) was amended in 2013 to include several stringent rules regarding the sharing of personal medical information via email. While it doesn’t prevent the use of emails, these rules make emailing...