When COVID-19 Spread, So Did Your Data. Here’s How to Protect It.

As workers become more comfortable in their new remote routines, it’s important to ensure they don’t let their guard down when it comes to storing and sharing company information.

Are Your Portfolio Companies Vulnerable to COVID-19 Phishing Scams?

Phishing attacks targeting private equity firms’ portfolio companies aren’t new, but the uncertainty surrounding COVID-19 has upped the game.

5 Best Practices for Setting Up Your Azure Network

If you’re looking for a cloud platform that increases your flexibility resulting in higher efficiency, Azure is your solution.

Are You Ready for Insurance Risk Assessments? Agio Says Yes

As a community, we may have started out thinking working remotely was temporary, but it’s now clear this is how we’ll be doing business for the foreseeable future.

Adapting to Meet Phishing Challenges

Avoid getting wrapped up in phishing scams by learning about your CER, or crossover error rate.

The Watch Commander’s Log for May 6th, 2020

We provide a direct view into the details of some of the threats Agio’s Managed Detection and Response (MDR) team handles for our clients—on an anonymized basis, of course.

Phishing Attack Targets Financial Services Executives

A phishing campaign is targeting Office 365 users specifically at financial services firms, and have compromised over 150 businesses.

To Patch or Not to Patch During COVID-19?

When everyone moved out of the office, the question of whether to patch or not to patch got a little hairy.

The COO’s Guide to Business Continuity During COVID-19

Here are steps to help you organize, prioritize, and ask the right questions to modify your Business Continuity Plan (BCP) to be airtight for the next business-impacting disaster.

Can Your MSP Handle COVID-19?

Your managed service provider (MSP) is one of the most important players on your team. Are they stepping up at this critical moment? If not, find a new one, fast.

Top 10 Sources for COVID-19 Cybersecurity Reporting

The best thing you can do is create a list of trusted sources. Here are some sources we recommend.

COVID-19: Malicious Domains, Malware & Phishing

Attackers were buying domains, building malicious websites, and creating phishing scams to steal information and shut down IT networks, including those at critical health facilities.