Agio's Position

Your go-to for thought leadership on cybersecurity events, trends in managed IT, the cloud, and other hot topics. Stay in the loop.

Read the latest

Incomplete MDR Coverage Leaves You Vulnerable
Incomplete MDR Coverage Leaves You Vulnerable
If it's there’s one thing you should do, it’s making sure you have a complete Managed Detection & Response service.
The Watch Commander’s Log: New Email from Evil Corp
The Watch Commander’s Log: New Email from Evil Corp
Last year’s notorious malware masterminds are at it again.
An Alternative Investment CTO’s Guide to Reducing Risk in Shared Workspaces
An Alternative Investment CTO’s Guide to Reducing Risk in Shared Workspaces
Consider these cybersecurity implications if you’re thinking about making changes to your office space in light of COVID-19.
Hindsight is 20/20: What CTOs Can Learn from COVID-19
Hindsight is 20/20: What CTOs Can Learn from COVID-19
These are the challenges CTOs faced during the rush of COVID-19, and the takeaways you can use to prepare for the next crisis.
How Insider Threats Exposed Twitter (and How You Can Prevent That)
How Insider Threats Exposed Twitter (and How You Can Prevent That)
Companies should review how other platforms can open a pathway for bad actors and how third-party vendors and contractors play a part.
Key Takeaways from Verizon’s 2020 Data Breach Investigation Report
Key Takeaways from Verizon’s 2020 Data Breach Investigation Report
Agio’s Managing Director of Cybersecurity offers his take on this year’s report.
How Agio Securely Empowers Remote Users
How Agio Securely Empowers Remote Users
These managed IT services provide a secure and compliant environment for end users—with minimal interruption.
Coronavirus: How to Do Business as Usual When It’s Anything But
Coronavirus: How to Do Business as Usual When It’s Anything But
Everything CTOs, CISOs, COOs, CFOs, and CCOs need to know to lead their organizations through the COVID-19 crisis.
How Has Your Business Continuity Plan Evolved as a Result of COVID-19?
How Has Your Business Continuity Plan Evolved as a Result of COVID-19?
You're not alone if BCP testing was on the back burner because other things took precedence.
A CTO’s Guide to Fighting Remote Worker Cybersecurity Complacency
A CTO’s Guide to Fighting Remote Worker Cybersecurity Complacency
Share this list of cybersecurity reminders with your remote workforce to refresh their understanding of their role in keeping the firm secure.
How to Pick Your MDR Partner
How to Pick Your MDR Partner
Finding a dependable MDR partner isn’t easy. These are the questions you’ll want to ask to find the right fit.
6 Components of an Optimized Azure Infrastructure
6 Components of an Optimized Azure Infrastructure
Whether you’ve been hosting all services in your own data center, a colocation service, or a vendor’s private cloud, it's critical to prepare and optimize the infrastructure before migrating to the public cloud.
The Watch Commander’s Log: Mr. Cisco’s Advanced Phishing Attempt
The Watch Commander’s Log: Mr. Cisco’s Advanced Phishing Attempt
Inside the investigation of two advanced phishing attempts aimed at our clients in a single week.
Does Your Cybersecurity and Governance Framework Meet the Gold Standard?
Does Your Cybersecurity and Governance Framework Meet the Gold Standard?
If your company has made it this far into the COVID-19 pandemic and is still healthy, it’s a good time to address any processes or practices you’ve been putting off.
The Watch Commander’s Log: The Rise of IoT Botnet Attacks
The Watch Commander’s Log: The Rise of IoT Botnet Attacks
Attack surface increases daily as new devices with lax security are added to networks at home and in businesses environments.