Hackers Compromise Nearly 2,000 Robinhood Accounts

Nearly 2,000 users of stock trading and investment app Robinhood are the latest victims of a steady string of financially motivated cyber-attacks.

How Microsoft Intune and Conditional Access Keep Endpoints Secure

With your firm is operating in the public cloud, make sure your workforce is operating safely, smartly, and securely.

Will Contact Tracing Apps Play a Role in Reopening Your Office?

Are you considering bringing your workforce back into the office? It’s a big decision that comes with significant considerations.

Revolutionizing the MSP Industry

We’re focused on building next gen technology that redefines what it means to be an enterprise partner of the future.

Security Operations Centers are Only as Good as a Company’s Culture

Here are some ideas that demonstrate the steps we take to be effective and productive.

4 Myths About Server Management, Debunked

Here are three reasons smart IT leaders are embracing automation and offloading server management to partners.

Hacking Awareness & Alternate Data Streams (ADS)

This post highlights some of the common technology that bad actors may use against systems to orchestrate attacks.

FastTrack to Microsoft 365 with Agio

How companies are seeing significant benefits from using Microsoft FastTrack.

Incomplete XDR Coverage Leaves You Vulnerable

Imagine yourself in this situation: You’re a diverse global company. COVID-19 is everywhere and hurting business, so you have to furlough some people.

Guide to Reducing Risk in Shared Workspaces

As alternative investment firms consider reopening their offices, many hedge fund and private equity CTOs are asking about the cybersecurity implications of moving to a shared office model.

Hindsight is 20/20: What CTOs Can Learn from COVID-19

If you’re a CTO, you’ve seen the joke: Do most companies have a disaster recovery plan (DRP) in place? Yes.

How Insider Threats Exposed Twitter (and How You Can Prevent That)

This week was rough for Twitter- they suffered a major breach that led to high-profile accounts being hacked.