Agio's Position

Your go-to for thought leadership on cybersecurity events, trends in managed IT, the cloud, and other hot topics. Stay in the loop.

Read the latest

Can Your MSP Handle COVID-19?
Can Your MSP Handle COVID-19?
Your managed service provider is one of the most important players on your team. Are they stepping up at this critical moment?
Top 10 Sources for COVID-19 Cybersecurity Reporting
Top 10 Sources for COVID-19 Cybersecurity Reporting
  You’re reading a lot about how COVID-19 is affecting business continuity, the pitfalls of remote working, phishing attacks, malware, and more. We’ve written about those…
COVID-19: Malicious Domains, Malware & Phishing
COVID-19: Malicious Domains, Malware & Phishing
Crisis breeds opportunity for bad actors. As early as January, attackers were buying domains, building malicious websites, trolling the dark web, and creating phishing scams to steal information and shut…
Patch Management in the New COVID-19 Normal
Patch Management in the New COVID-19 Normal
Right now, it’s easy to second-guess choices. We’ve never been in this situation before—sending employees home to work remotely isn’t business as usual. Companies have had to act fast, and…
7 Critical Focus Areas as You Move to a Work-From-Home Model
7 Critical Focus Areas as You Move to a Work-From-Home Model
COVID-19 is putting us all in a position of setting up remote workers even if it’s not been the norm. Things are moving fast, and that means we have to…
The C-Suite’s Top IT Security COVID-19 Ripple Effects
The C-Suite’s Top IT Security COVID-19 Ripple Effects
Shifting your workforce to work from home and mounting vigilance around Coronavirus phishing have been two short-term trends IT and Cybersecurity leaders are acutely aware of in this…
What COVID-19 Means for the Cyber-Operations of Hedge Funds
What COVID-19 Means for the Cyber-Operations of Hedge Funds
COVID-19 is officially a pandemic, and it’s causing stressors in nearly every facet of our professional and personal lives. As if managing potential exposure and health risks aren’t enough, we’re…
Weaponized Coronavirus Phishing & How to Protect Yourself
Weaponized Coronavirus Phishing & How to Protect Yourself
It was only a matter of time before bad actors began preying on people’s fear of the coronavirus pandemic—and that time is now. Phishing campaigns with mock-up coronavirus (COVID-19) heat…
Pros & Cons of Keeping Your Exchange Server with Office 365
Pros & Cons of Keeping Your Exchange Server with Office 365
After months of planning, preparation, and migration efforts, you’ve finally moved from your on-premises Exchange 201x system to Office 365. Now you’re thinking, “do we need to keep our Exchange…
Managed Detection & Response for Hedge Funds
Managed Detection & Response for Hedge Funds
Since no cybersecurity apparatus is impenetrable, it is essential for hedge funds to have robust strategies for detecting and responding to threats.
Protecting Private Equity, Real Estate, and Credit from Wire and Payment Transfer Fraud
Protecting Private Equity, Real Estate, and Credit from Wire and Payment Transfer Fraud
Wire and payment transfer fraud are two of the top ways alternative investment firms lose significant money to attackers.
All Things Cybersecurity from the SEC OCIE for 2020
All Things Cybersecurity from the SEC OCIE for 2020
January was a big month for the SEC OCIE, releasing both their 2020 Examination Priorities and their even beefier Observations on Cybersecurity and Resiliency Practices.  After reading between…
Your Portfolio Companies are Under Siege
Your Portfolio Companies are Under Siege
In light of an increased threat of cyber-attacks from Iran, Risk Officers at private equity firms are questioning how prepared their portfolio companies are for international cyber-attacks. The elements these…
Agio’s 10-Year Anniversary: Letter from CEO, Bart McDonough
Agio’s 10-Year Anniversary: Letter from CEO, Bart McDonough
Ten years ago today, I was fortunate enough to have an opportunity to turn an idea into a strategy, coupled with a culture, which resulted in Agio. With an established culture, more than 275 employees and…
Cloud Hopper
Cloud Hopper
What is it? Cloud Hopper is an ongoing cyber espionage campaign originally discovered back in 2016 with activities reaching as far back as 2014.  Executed by a Chinese-based threat actor…