Agio's Position

Your go-to for thought leadership on cybersecurity events, trends in managed IT, the cloud, and other hot topics. Stay in the loop.

Read the latest

Business Email Compromise (BEC)
Business Email Compromise (BEC)
The FBI has identified business email compromise, or BEC, as one of the most ubiquitous forms of cybercrime in use today.
Your Antivirus Solution Alone, Stinks
Your Antivirus Solution Alone, Stinks
That’s right, it’s not as good as it should be, but let’s redirect blame to the bad actors and the ingenious methods they use to evade your end point security.
CIS Controls v7
CIS Controls v7
Worms, viruses, phishing, advanced persistent threats (APT), IoT devices, users clicking on bad links, attacks from organized nation states...where do you start to defend?
Why did we acquire a cybersecurity firm?
Why did we acquire a cybersecurity firm?
In order to achieve our vision, we had to have the skills, methodology and overall infusion of cybersecurity leadership and discipline into our firm.
Internet Explorer Zero Day Vulnerability (ID CVE-2018-8653)
Internet Explorer Zero Day Vulnerability (ID CVE-2018-8653)
Read our security team's debrief on the latest critical cybersecurity threat.
Why do clients call us?
Why do clients call us?
Since founding Agio, potential clients come to us for almost always one reason, and it's the same reason that led me to start Agio.
Digital Value is in the Eye of the Beholder
Digital Value is in the Eye of the Beholder
Sometimes, the information that’s given away has more value to the recipient than it does to you.
Lost Laptops; Lost Data
Lost Laptops; Lost Data
Don’t be lulled into a false sense of security just because news of breaches usually involve enterprise mainframes. You’re equally vulnerable and exposed on the other end of the IT spectrum.
Contacting Law Enforcement Post Cyber-Attack
Contacting Law Enforcement Post Cyber-Attack
If your home or office were burglarized, your first step would be to call the police, but what happens if your hedge fund or private equity firm is the victim…
SEC Warns about Vendor Payments
SEC Warns about Vendor Payments
There is new information regarding a type of Wire Transfer Fraud that we want clients to be aware of, and prepared to defend against. In the SEC’s report…
How to Stop Wire Transfer Fraud
How to Stop Wire Transfer Fraud
Managed Detection & Response alerts catch the multi-faceted attacks the good guys are up against, saving you from falling victim to wire transfer fraud.
Detect Phishing: 101
Detect Phishing: 101
“91% of cyber-attacks start with a phishing email.” -  Digitalguardian.com
What Does Your MDR Solution  <em>Really </em>Do?
What Does Your MDR Solution Really Do?
There are a ton of Managed Detection & Response (MDR) services out there, but breaking them down in plain English so you know what you’re really getting is a bit tougher. 
You&#8217;re in the Public Cloud, Now What?
You’re in the Public Cloud, Now What?
Many firms are in the midst of developing a Public Cloud strategy in an effort to reduce costs, gain productivity, and improve the security of their infrastructure.  But don’t be fooled, the ease of adoption and the initial setup doesn’t mean you’re secure by default…
Private Equity &#038; Venture Capital, “Ugggh” is Not a Response
Private Equity & Venture Capital, “Ugggh” is Not a Response
Over the past year, we’ve identified a growing trend in private equity and venture capital firms with respect to cybersecurity events.