Everything You Need to Know About the NY Shield Act

We explore how this may affect your investors and employees and what action you should take now.

Your SQL Server 2008 and 2008 R2 are No Longer Receiving Security Updates

A lot changed in technology since 2008 R2 was released, and before you upgrade to a newer version, it’s good to ask some questions about your current configuration.  

How to Start a Private Equity Firm

A properly managed IT infrastructure is one of the most important decisions you can make and is critical for building a scalable organization.

DDQs for Alternative Investment Firms

Did you know the second most common reason a hedge fund is hacked is through a vendor?

How the Most Secure Private Equity Firms Manage Deal Data

When it comes to the crown jewels of a PE firm, deal data is it.  So the question is – what are you doing about yours?

The When & Why for MongoDB

MongoDB has been around since 2007, but only recently started getting more attention as a viable database solution.

Why your accidental DBA strategy isn’t good enough

If you aren’t being proactive when managing your database environment, you’re essentially waiting for on an outage or critical issue to identify issues in production. Isn’t that too late?

Your Top 5 DBA Mistakes

One of the first steps when onboarding a client to Agio’s DBA Service, is to dig deep into their environment, ensuring everything is configured according to best practices and industries standards.

Business Email Compromise (BEC)

The FBI has identified business email compromise, or BEC, as one of the most ubiquitous forms of cybercrime in use today.

Your Antivirus Solution Alone, Stinks

That’s right, it’s not as good as it should be, but let’s redirect blame to the bad actors and the ingenious methods they use to evade your end point security.

CIS Controls v7

Worms, viruses, phishing, advanced persistent threats (APT), IoT devices, users clicking on bad links, attacks from organized nation states…where do you start to defend?

Why Did we Acquire a Cybersecurity Firm?

In order to achieve our vision, we had to have the skills, methodology and overall infusion of cybersecurity leadership and discipline into our firm.