Blog

Blog RW AUG 2022

Data Recovery isn’t always enough

Just because you can recover your data after ransomware doesn’t mean you won’t suffer losses. Let’s say your company lost its data but fortunately managed to get it all back. Either by recovering the data from an offsite storage, an…

First Car Blog

What’s Your Favorite User Credential Your Employees Give Up?

As an IT professional, you’ve got a sixth sense about scams that kicks in on social media. That’s why it’s probably frustrating to see your family and friends on social media posting funny memes with crazy questions. It’s all in…

Work from home

Ways to Avoid a Cyber Disaster from Your Remote Workforce

At the office, you’re able to set up security on your users’ laptops. But how about the computers your employees use at home? When browsing the internet, opening emails, and downloading documents, are your employees’ home computers just as secure?…

Best buy

How Simple Tricks Can Bypass Your Cybersecurity Tools and Technology

A while back, a young salesperson at our company appeared to receive an email from an officer of the company that read: Britney, I need a huge favor and I normally wouldn’t ask you to do this but it’s time…

Robot USB

USB Drives: Shiny Objects That Lead to Cybersecurity Headaches

It’s one of your many nightmares as an IT director. An employee is walking along and finds a flash drive in the company parking lot. They want to be a good Samaritan and return the flash drive to its owner.…

CyberSecurity Flipped

Security as a Service: Because You Never Planned on Being a Security Expert

More and more fully staffed IT departments are beginning to look at protecting their networks by moving to a Security as a Service model versus taking on the task themselves. Similar to the rationale behind software as a service (SaaS),…

pexels the coach space 2977565

Are You Complacent or Productively Paranoid?

Are You Complacent or Productively Paranoid? During the conferences and tradeshows where we’ve exhibited over the years, we meet many IT professionals from a variety of companies and industries. We find that many IT professionals fall into one of two…

pexels funny foxy pride 6484594

When Penetration Testing creates “Bad Optics”

Recently, we’ve been seeing a steady number of RFPs for Cyber Security solutions roll in that not only request items such as email security, firewall and end point protection but they also want penetration testing included with the solution. When…

sign here

Acceptance of Risk – Please Sign Here

So, I read a post on social media where a gentleman was asking if there was a risk management document out there that could be submitted to application owners, business owners and system admins who after a consultation decide not…

pexels IT DISC web

C-Level/Information Technology Disconnect is a Huge Risk

For over a decade of navigating through the sales process with countless executives, we’ve noticed a similar, large disconnect throughout the layers of many organizations. Yes, we can all probably agree that a successful leader is one who surrounds themselves…

Give us 15 minutes and you'll know if we're right for you.

Scroll to Top