Chat with us, powered by LiveChat

Agio's Position

Your go-to for thought leadership on cybersecurity events, trends in managed IT, the cloud, and other hot topics. Stay in the loop.

Read the latest

Everything You Need to Know About the NY Shield Act
Everything You Need to Know About the NY Shield Act
On July 25, 2019 Governor Cuomo signed the Stop Hacks and Improve Electronic Data Security Act (SHIELD Act), amending the state’s data breach notification law and expanding the requirements…
Your SQL Server 2008 and 2008 R2 are No Longer Receiving Security Updates
Your SQL Server 2008 and 2008 R2 are No Longer Receiving Security Updates
Back in January 2010 when SQL Server 2008 R2 was released, the world was a different place.  The very first iPad had yet to be sold, Alabama beat Texas to…
How the Most Secure Private Equity Firms Manage Deal Data
How the Most Secure Private Equity Firms Manage Deal Data
“We can’t do that,” was the response from IT. The request came last year from counsel after the private equity firm decided not to move forward with a new acquisition, which meant it needed to remove all related deal data from its systems.
The When & Why for MongoDB
The When & Why for MongoDB
MongoDB has been around since 2007, but only recently started getting more attention as a viable database solution. I’m often asked why I would choose MongoDB over SQL, and here are the reasons I usually give...
Why your accidental DBA strategy isn’t good enough
Why your accidental DBA strategy isn’t good enough
If you aren’t being proactive when managing your database environment, you’re essentially waiting for on an outage or critical issue to identify issues in production. Isn’t that too late?
Your Top 5 DBA Mistakes
Your Top 5 DBA Mistakes
One of the first steps when onboarding a client to Agio’s DBA Service, is to dig deep into their environment, ensuring everything is configured according to best practices and industries standards.
Business Email Compromise (BEC)
Business Email Compromise (BEC)
The FBI has identified business email compromise, or BEC, as one of the most ubiquitous forms of cybercrime in use today.
Your Antivirus Solution Alone, Stinks
Your Antivirus Solution Alone, Stinks
That’s right, it’s not as good as it should be, but let’s redirect blame to the bad actors and the ingenious methods they use to evade your end point security.
CIS Controls v7
CIS Controls v7
Worms, viruses, phishing, advanced persistent threats (APT), IoT devices, users clicking on bad links, attacks from organized nation states...where do you start to defend?
Why did we acquire a cybersecurity firm?
Why did we acquire a cybersecurity firm?
In order to achieve our vision, we had to have the skills, methodology and overall infusion of cybersecurity leadership and discipline into our firm.
Internet Explorer Zero Day Vulnerability (ID CVE-2018-8653)
Internet Explorer Zero Day Vulnerability (ID CVE-2018-8653)
Read our security team's debrief on the latest critical cybersecurity threat.
Why do clients call us?
Why do clients call us?
Since founding Agio, potential clients come to us for almost always one reason, and it's the same reason that led me to start Agio.
Digital Value is in the Eye of the Beholder
Digital Value is in the Eye of the Beholder
Sometimes, the information that’s given away has more value to the recipient than it does to you.
Lost Laptops; Lost Data
Lost Laptops; Lost Data
Don’t be lulled into a false sense of security just because news of breaches usually involve enterprise mainframes. You’re equally vulnerable and exposed on the other end of the IT spectrum.
Contacting Law Enforcement Post Cyber-Attack
Contacting Law Enforcement Post Cyber-Attack
If your home or office were burglarized, your first step would be to call the police, but what happens if your hedge fund or private equity firm is the victim…