Agio's Position

Your go-to for thought leadership on cybersecurity events, trends in managed IT, the cloud, and other hot topics. Stay in the loop.

Read the latest

Coronavirus: How to Do Business as Usual When It’s Anything But
Coronavirus: How to Do Business as Usual When It’s Anything But
Everything CTOs, CISOs, COOs, CFOs, and CCOs need to know to lead their organizations through the COVID-19 crisis.
How Has Your Business Continuity Plan Evolved as a Result of COVID-19?
How Has Your Business Continuity Plan Evolved as a Result of COVID-19?
You're not alone if BCP testing was on the back burner because other things took precedence.
A CTO’s Guide to Fighting Remote Worker Cybersecurity Complacency
A CTO’s Guide to Fighting Remote Worker Cybersecurity Complacency
Share this list of cybersecurity reminders with your remote workforce to refresh their understanding of their role in keeping the firm secure.
How to Pick Your MDR Partner
How to Pick Your MDR Partner
Finding a dependable MDR partner isn’t easy. These are the questions you’ll want to ask to find the right fit.
6 Components of an Optimized Azure Infrastructure
6 Components of an Optimized Azure Infrastructure
Whether you’ve been hosting all services in your own data center, a colocation service, or a vendor’s private cloud, it's critical to prepare and optimize the infrastructure before migrating to the public cloud.
Mr. Cisco’s Advanced Phishing Attempt
Mr. Cisco’s Advanced Phishing Attempt
Inside the investigation of two advanced phishing attempts aimed at our clients in a single week.
Does Your Cybersecurity and Governance Framework Meet the Gold Standard?
Does Your Cybersecurity and Governance Framework Meet the Gold Standard?
If your company has made it this far into the COVID-19 pandemic and is still healthy, it’s a good time to address any processes or practices you’ve been putting off.
The Rise of IoT Botnet Attacks
The Rise of IoT Botnet Attacks
Attack surface increases daily as new devices with lax security are added to networks at home and in businesses environments.
Are Portfolio Companies Ready for Business as Usual?
Are Portfolio Companies Ready for Business as Usual?
It’s crucial for private equity firms to assess how portfolio companies identify, mitigate, and manage risk during the transition from remote to office.
5 Actions to Take Ahead of CCPA Enforcement
5 Actions to Take Ahead of CCPA Enforcement
Enforcement by the California Attorney General’s Office for the California Consumer Privacy Act begins July 1.
Are Your Users Happy with IT in a Work-From-Home Environment?
Are Your Users Happy with IT in a Work-From-Home Environment?
As a CTO, your workload increased significantly when COVID-19 hit and forced everyone to work remotely, so did expectations.
When COVID-19 Spread, So Did Your Data. Here’s How to Protect It.
When COVID-19 Spread, So Did Your Data. Here’s How to Protect It.
As workers become more comfortable in their new remote routines, it’s important to ensure they don’t let their guard down when it comes to storing and sharing company information.
How to Spot Indicators of Compromise While Working from Home
How to Spot Indicators of Compromise While Working from Home
The sooner you can discover malicious activities, the easier it is to minimize damage or loss.
Are Your Portfolio Companies Vulnerable to COVID-19 Phishing Scams?
Are Your Portfolio Companies Vulnerable to COVID-19 Phishing Scams?
A recent post cited a 6,000% increase in spam related to COVID-19 since the pandemic was declared in March.
5 Best Practices for Setting Up Your Azure Network
5 Best Practices for Setting Up Your Azure Network
Your migration to Azure involves more than just relocating servers or copying files and databases.