Are Your Portfolio Companies Vulnerable to COVID-19 Phishing Scams?

Phishing attacks targeting private equity firmsā€™ portfolio companies arenā€™t new, but the uncertainty surrounding COVID-19 has upped the game.

5 Best Practices for Setting Up Your Azure Network

If youā€™re looking for a cloud platform that increases your flexibility resulting in higher efficiency, Azure is your solution.

Are You Ready for Insurance Risk Assessments? Agio Says Yes

As a community, we may have started out thinking working remotely was temporary, but itā€™s now clear this is how weā€™ll be doing business for the foreseeable future.

Adapting to Meet Phishing Challenges

Avoid getting wrapped up in phishing scams by learning about your CER, or crossover error rate.

Your On-Prem Migration to Agio Managed Azure

Clients want to add agility to their IT estate while reducing (or eliminating) their data center footprint. Here are the four key stages for a successful and cost-effective migration.

The Watch Commander’s Log for May 6th, 2020

We provide a direct view into the details of some of the threats Agioā€™s Managed Detection and Response (MDR) team handles for our clientsā€”on an anonymized basis, of course.

Phishing Attack Targets Financial Services Executives

A phishing campaign is targeting Office 365 users specifically at financial services firms, and have compromised over 150 businesses.

Your MSPā€™s #1 Checklist During COVID-19

Nimble. Adaptive. Personal.

Reviewing & Verifying PCI Policy for WFH Environments

Cybercriminals love a crisis, and the COVID-19 pandemic is the equivalent of a crisis party where everyone is invited, and no one is checking IDs at the door.

To Patch or Not to Patch During COVID-19?

When everyone moved out of the office, the question of whether to patch or not to patch got a little hairy.

3-Step Blueprint to a Speedy Public Cloud Migration

Hereā€™s a high level, 3-step blueprint for your engineers to ensure a migration to the public cloud is swift and successful.

The #1 Health Check for CTOs in a WFH Era

Now that most organizations are fully operational from home, the question is, where are your bussiness’ cybersecurity holes?