Sitemap
Sitemap
Pages
- 2022 Dark Web Assessment
- 2022 Hedge Fund Cybersecurity Trends Report
- 2022 Hedge Fund Managed IT Trends Report
- 2023 Hedge Fund Cybersecurity Trends Report
- 2023 Hedge Fund Managed IT Trends Report
- About
- Account
- Agio & Stellar Cyber Focus Event - LA
- Agio & Stellar Hedge Fund CFO, COO Cyber Focus Event
- Agio Advisory Board 2023
- Agio Ahead Event
- Agio Blu
- Agio Bundle
- Agio Forward Event
- AgioNow
- AgioNow Platform Request
- Bart McDonough, CEO
- Brilliance in the Basics
- Contact
- Contact Form
- Contact Us - Form Only
- Cyber Monday Deal
- Cyber-Health Checklist
- Cybersecurity Consulting LP
- Cybersecurity Quiz
- Cybersecurity Services LP
- Data Breach Recovery Services LP
- Database Management LP
- Desktop-as-a-Service LP
- EMAIL DISCLAIMER
- Example Video Editing
- Incident Response Management LP
- Industries
- IT Contractors LP
- IT Help Desk LP
- IT Support LP
- Jean McCabe
- Join Us
- Learn About Cybersecurity & Information Technologies
- Log In
- Managed IT & Cybersecurity for Financial Services
- Managed IT & Cybersecurity LP
- Moving Forward eBook
- Needs
- Outsourced IT LP
- Password Reset
- Phishing Protection LP
- Platform
- Privacy Policy
- Profile
- Register
- Resources
- ROI Calculator -No Form
- Roles
- SEC Cybersecurity Risk Management Rules
- Server Management LP
- Services
- Cybersecurity
- Intelligent IT
- Application Management
- Database Management
- Database Management
- Disaster Recovery
- End User Support
- Global Service Desk
- Global Service Desk Demo
- IT Advisory Services
- IT Infrastructure Assessment
- IT-as-a-Service
- Network Management
- Network Management Demo
- On-Site Support
- Server Management
- Server Management
- System Management
- System Monitoring
- Sitemap
- System Management
- Testing Popups
- Thank You
- Thank You
- The AgioNow NYC Release Event
- The AgioNow Portal LA Release Event
- Threat Detection Services LP
- Vulnerability Management LP
- White Paper
Posts
Agio Academy
- 5 Creative Ways to Communicate with Microsoft Teams
- 5 Outlook Tips and Tricks for Productivity
- 5 Productivity Tips for PowerPoint
- 5 Things You Didn’t Know About Microsoft SharePoint
- 5 Tips and Tricks for Tables in Excel
- 6 Insider Tips for Microsoft Teams
- 6 Tips for Managing Access in SharePoint
- Best Add-ins for Excel
- Best Add-ins for Word
- Best Add-ons for PowerPoint
- Best Free Windows Apps
- Common HIPAA Violations
- Excel for Beginners
- Great Ways to Visualize Data in Excel
- How to Back Up and Sync SharePoint
- How to Calculate Portfolio Risk Using Excel’s VAR Function
- How to Color-Code Your Emails in Microsoft Outlook
- How to Combine and Repeat Cells in Excel
- How to Combine Data from Multiple Sheets in Microsoft Excel
- How to Consolidate Data From Multiple Tabs Into One in Excel
- How to Create a PivotTable for Multiple Sheets in Excel
- How to Create a Target Line in Excel Charts
- How to Create Random Numbers in Microsoft Excel
- How to Hold a Safe, Secure Telehealth Appointment
- How to Lock Cells in Microsoft Excel
- How to Make a Custom Spell Check List in Excel
- How to Make Your iPhone Grayscale
- How to Prepare for a HIPAA Audit
- How to Prepare for a PCI Audit
- How to Protect Microsoft 365 from Cyberattacks
- How to Restrict Apps on Company iPhones
- How to Safely Download Files in SharePoint
- How to Safely Share Files in SharePoint
- How to Scrape the Web with Excel
- How to Set Up Multifactor Authentication
- How to Set Up Text Replacement Shortcuts Using iOS
- How to Stay HIPAA-Compliant
- How to Stay PCI-Compliant
- How to Sync OneDrive with SharePoint
- How to use Excel Live Collaboration in Microsoft Teams meetings
- How to Use Flash Fill in Excel
- How to Use People Graph in Excel
- How to Use Power Automate to Send Emails from Excel
- How to Use Send Delays in Outlook
- How to Use the DAX CALCULATE Function in Excel
- How to Use the Excel BYROW and BYCOL Functions
- How to Utilize Sparklines in Excel
- List of Pro Excel Hotkeys
- Microsoft Azure Increases Your Productivity
- Microsoft Excel April 2023 Update: 3 Key Takeaways for Investment Managers
- Microsoft Web Capture: Taking Screenshots to the Next Level
- Microsoft Word Productivity Tips
- Private vs. Public Cloud Computing
- Threads Has Arrived. Here’s What You Need to Know.
- What are the Services Available in Microsoft 365?
- What is Microsoft 365, and How Does It Work?
- What Is PCI?
- What’s the Difference Between Office 365 and Microsoft 365?
- When to Use Drop-Down Lists in Excel
Cybersecurity
- $1.5M Cybersecurity Fine for Chicago Futures Brokerage
- 10 Myths About Cybersecurity
- 10 Things Everyone Should Know About Cybersecurity
- 10 Ways to Maximize Privilege for Cybersecurity Forensic Reports
- 2021 SEC Division of Examinations Security Policies Report
- 2023 Cybersecurity Trends Report: Hedge Funds Outsource to Fight Surge in Cyberattacks
- 3 Risk Assessment Myths, Busted
- 4 Common Mistakes to Avoid in Microsoft Word
- 4 Reasons Why You Need a HITRUST Partner Now
- 5 Actions to Take Ahead of CCPA Enforcement
- 5 Growing Cyber Risks Facing the Financial Sector This Year
- 6 Microsoft SharePoint Security Tips
- 6 Tips for Managing Access in SharePoint
- 7 Critical Focus Areas as You Move to a Work-From-Home Model
- 7 Cybersecurity Risks for Private Equity Firms
- 7 Office Quirks We Miss Most
- 7 Things Registered Advisors Can Do Now to Prepare for the SEC’s Cyber Risk Management Rules
- 9 Common Phishing Techniques
- A Brief Overview of U.S. Privacy Laws
- A CTO’s Guide to Fighting Remote Worker Cybersecurity Complacency
- A Guide for Alternative Investment COOs: What’s the Difference Between Managed IT, Cybersecurity Operations, and Cyber Governance?
- Agio Cyber Risk Register: Your Governance Program in a Single Pane
- Agio’s M@rch Cybersecurity P@s$word Pl@yoffs: 2022 Championship
- Agio’s March Cybersecurity Password Playoffs: Secure 16
- AI Explained: 6 Takeaways from Our Webinar Hosted by Agio CEO, Bart McDonough
- All Things Cybersecurity from the SEC OCIE for 2020
- Are Portfolio Companies Ready for Business as Usual?
- Are You Ready for Insurance Risk Assessments? Agio Says Yes
- Are You Ready for Ransomware as a Commercial Enterprise?
- Are You Using The Same Three Passwords From Five Years Ago?
- Are Your Compliance Efforts Putting You at Risk?
- Best Practices for Home Network Security
- Bitcoin Security Issues
- Buffett: “Cyber attacks #1 threat”
- Business Email Compromise (BEC)
- Can Your Employees Handle an Attack Every 11 Seconds?
- Changes in Cybersecurity are Coming in 2022
- Changing Threat of Email Attacks on Private Equity Firms
- CIS Controls v7
- Cloud Hopper
- Colonial Pipeline Ransomware: What We Can Learn from This Attack
- Common Cyber Risks in Healthcare
- Common Due Diligence Questions Investors are Asking
- Contacting Law Enforcement Post Cyber-Attack
- COVID-19: Malicious Domains, Malware & Phishing
- Cryptocurrency Security Risks
- Cryptocurrency Vulnerabilities
- CTOs are Choosing Agio for Penetration Testing Services. Here’s Why.
- Cyber Attack Severity Increasing In Hybrid Workplaces
- Cybersecurity & Compliance Regulation Best Practices in 2023
- Cybersecurity & Governance Framework Meet the Gold Standard
- Cybersecurity Best Practices
- Cybersecurity Challenges Hedge Funds and Private Equity Firms Face
- Cybersecurity Checklist for Hedge Funds
- Cybersecurity Checklist for Private Equity Firms
- Cybersecurity Checklist for the Financial Industry
- Cybersecurity Governance Best Practices
- Cybersecurity Risks for Hedge Funds
- Cybersecurity Risks for Investment Banks
- Cybersecurity Risks of 5G Networks
- Cybersecurity Risks Posed by the Silicon Valley Bank (SVB) Shutdown
- Cybersecurity vs Network Security vs Information Security: What’s the Difference?
- Debunking the Misconceptions of Consolidating IT and Cybersecurity Providers
- Dejablue: The Return of BlueKeep
- Details on the Kaseya Ransomware Cyberattack
- Detection & Response First. Prevention Second.
- Digital Value is in the Eye of the Beholder
- Disaster Recovery Terminology and Definitions
- Do You Have an IT Disaster Recovery Plan?
- Don’t be a Victim of Income Tax Identity Theft
- Everything You Need to Know About the NY Shield Act
- First-Party vs. Third-Party Risks
- Forecasting in the Clouds
- GDPR & What Financial Services Needs to Know
- Global Ransomware Attack
- Government Security: Do As I Say, Not As I Do?
- Guide to Business Continuity Planning for Investment Firms
- Guide to Reducing Risk in Shared Workspaces
- Hackers Compromise Nearly 2,000 Robinhood Accounts
- HAFNIUM Microsoft Exchange Server Vulnerabilities—and Solutions
- Hashed Passwords Are Personal Information Under U.S. Law
- Have I Been Breached? A Step-by-Step Guide for Investment Management COOs to help Identify, Respond to, and Recover from a Cyber Breach
- Healthcare’s Ransomware Exposure in the Time of COVID-19
- Hedge Fund Crown Jewel Data
- Here are the Top 3 Portfolio Company Cybersecurity Risks
- Hindsight is 20/20: What CTOs Can Learn from COVID-19
- HIPAA Safe Harbor Bill Becomes Law & Incentivizes Security
- How Agio Securely Empowers Remote Users
- How Insider Threats Exposed Twitter (and How You Can Prevent That)
- How Open XDR Empowers CTOs with Automated Response
- How Secure is Cryptocurrency?
- How the Most Secure Private Equity Firms Manage Deal Data
- How to Avoid HIPAA Violation Fines
- How to be a Healthcare BA and Not Lose 25 Million PHI Records
- How to Choose a Cybersecurity Framework
- How to Create an Information Security Plan
- How To Detect Phishing: A Beginner’s Guide
- How to Email Someone Your Calendar Using Outlook
- How to Pick Your XDR Partner
- How to Properly Manage Passwords
- How to Protect Against Phishing
- How to Protect Microsoft 365 from Cyberattacks
- How To Protect Private Equity Firms From Wire Transfer Fraud
- How to Secure Your Crypto Wallet
- How to Set Up Email Filters in Microsoft Outlook
- How to Set Up Multifactor Authentication
- How to Spot Indicators of Compromise While Working From Home
- How to Stop Wire Transfer Fraud
- How to Switch Data in Columns and Rows in Excel
- How to Unlock Protected Excel Sheets Without a Password
- In Cybersecurity, Governance Trumps Technology
- Incomplete XDR Coverage Leaves You Vulnerable
- International Cybersecurity Best Practices
- Internet Explorer Zero Day Vulnerability (ID CVE-2018-8653)
- Introducing Agio Shield, the Latest Enhancement to Our XDR Service
- Introducing Agio Sting: The Latest Addition to Our XDR Service
- Is Cryptocurrency High Risk?
- Is Governance Missing From Your Firm’s Approach to Cybersecurity?
- Is Your Cybersecurity Really Covered? 7 Questions to Ask Your MSP
- IT and Cybersecurity Teams Need to Work Together
- Juice Jacking: The Scary New Threat to Your Phone’s Security
- Keep Your Data Safe During a Nation-State Threat
- Key Takeaways from Verizon’s 2020 Data Breach Investigation Report
- Key To A Successful Cybersecurity Career At Agio
- Learning from T-Mobile’s Cybersecurity Mistakes
- Lost Laptops; Lost Data
- Maintaining Cybersecurity While Working Remotely
- Make Sure Your Users Aren’t The Problem
- Managed Detection & Response for Hedge Funds
- Modern Processors Meltdown & Spectre Cause Web Vulnerability
- National Cybersecurity Awareness Month: Finale
- National Cybersecurity Awareness Month: Week 1
- National Cybersecurity Awareness Month: Week 2
- National Cybersecurity Awareness Month: Week 3
- National Health IT Week
- Navigating the Intersection of Cybersecurity and Compliance: A Message for Hedge Fund CTOs and CCOs
- Netscaler Vulnerability
- No Detection and Response? No Cybersecurity Insurance.
- Office 365 for Hedge Funds and Private Equity
- Penetration Testing Process
- Phishing Attack Targets Financial Services Executives
- Preempting Cybersecurity Risks When Recency Bias Is Good
- Private Equity & Venture Capital, “Ugggh” is Not a Response
- Private Equity vs. Hedge Fund: Which Is Harder to Secure?
- Proton Announces Proton Pass: The Next-Level Password Manager
- Quest for Better IT and Cybersecurity: AI + Human Brilliance from Agio
- Ransomware Poses an Imminent Threat to U.S. Healthcare
- Ransomware Prevention, Simplified
- Reviewing & Verifying PCI Policy for WFH Environments
- School, Security & SHR Solutions
- SEC Adopts Rules Permitting E-Signature Authorization
- SEC Cybersecurity Rule Changes: The Straight Path to Now
- SEC Disclosure Rule for Public Companies: Unpacking the “Reportable Material Incident”
- SEC Rule 38a-2 Means You Can’t Ignore Cyber Governance Anymore
- SEC Sanctions Eight Firms for Cybersecurity Procedures. Are You Next?
- SEC Warns about Vendor Payments
- SEC Warns of Fraudsters
- Secure Alternatives to Single-Factor Authentication and Password Managers
- Secure Medical Diagnosis Software
- Shifting Cyber Landscape Putting Insurance Coverages at Risk
- Spear Phishing — A Threat to Hedge Funds & Private Equity Firms
- Strengthen Your Private Equity Investments with Agio’s Comprehensive Cybersecurity Solutions
- Strengthening Cybersecurity in Higher Education
- Telehealth & COVID-19: The New Reality
- The #1 Health Check for CTOs in a WFH Era
- The C-Suite’s Top IT Security COVID-19 Ripple Effects
- The CIA Triad of Information Security: Availability
- The CIA Triad of Information Security: Confidentiality
- The CIA Triad of Information Security: Integrity
- The COO’s Guide to Business Continuity During COVID-19
- The CTO’s Checklist for Returning to the Office
- The Four Dimensions to Cybersecurity That Really Matter
- The Future of Cybersecurity and Cyberattacks
- The Hidden ROI of HITRUST Certification
- The Importance of Cybersecurity in Healthcare
- The Importance of Physical Security
- The Importance of Tabletop Exercises
- The LastPass Data Breach: What to Do Now
- The Need for Cybersecurity in a Crypto Economy
- The Time We Hacked a Private Equity Firm…from Their Lobby
- The Top 10 Cybersecurity Blogs for 2021
- Threads Has Arrived. Here’s What You Need to Know.
- Top 10 Sources for COVID-19 Cybersecurity Reporting
- Top 3 Hedge Fund Cybersecurity Threats
- Top 5 Cybersecurity Risks for Private Equity
- Truth About Public Wi-Fi: What You Don’t Know Can Hurt You
- Turning Challenges into Change: Financial Services COOs 2024 Outlook
- Turning Challenges into Change: Financial Services CTOs IT and Cyber Perspective for 2024
- Turning Challenges into Change: Hedge Fund CFOs’ Agenda for 2024
- Types of IoT Cyber Risks
- Vendor Due Diligence Cybersecurity Checklist for New SEC Rules
- Verizon Report 2017
- Vulnerability Scanning vs. Penetration Testing
- WannaCry Ransomware
- Want to be ready for the new SEC Cybersecurity Risk Management Rules? Here’s How.
- We’re Still the Weakest Link
- Weaponized Coronavirus Phishing & How to Protect Yourself
- What COVID-19 Means for the Cyber-Operations of Hedge Funds
- What Cyber Threats Are Lurking in the Shadows?
- What Does Your MDR Solution Really Do?
- What is a HIPAA violation?
- What is a Zero-Day Exploit?
- What Is Cybersecurity?
- What Is Enterprise Cybersecurity?
- What Is the National Institute of Standards and Technology Cybersecurity Framework?
- What The New SEC Cyber Rules Mean for Hedge Funds
- What the SEC’s Proposed Changes to Reg S-P Mean for Your Firm
- What Types of Devices are Hackable?
- When COVID-19 Spread, So Did Your Data. Here’s How to Protect It.
- Which Gaps Did Log4j Expose in Your Cybersecurity Governance?
- Who Is Ultimately Responsible for Cybersecurity?
- Why are Cyberattacks Getting So Much Worse?
- Why Are Software Updates and Patches Important?
- Why Did we Acquire a Cybersecurity Firm?
- Why iPhone Lockdown Mode Is a Must for C-Suite Cyber Risk Management
- Why It Makes Sense to Consolidate Managed IT and Security Operations
- Why the Rosen-Cassidy Healthcare Cybersecurity Act May Fail
- Why Your HITRUST Certification is More Important Than Ever
- Will Contact Tracing Apps Play a Role in Reopening Your Office?
- Work from Home: 7 Things You Never Thought About
- XDR vs. MDR vs. EDR: What’s the Difference?
- Your Antivirus Solution Alone, Stinks
- Your MSP’s #1 Checklist During COVID-19
- Your Network is Only as Secure as Your Vendors’ Networks
- Your Portfolio Companies are Under Siege
Healthcare
- 10 Ways to Maximize Privilege for Cybersecurity Forensic Reports
- 4 Reasons Why You Need a HITRUST Partner Now
- A Brief Overview of U.S. Privacy Laws
- AI Explained: 6 Takeaways from Our Webinar Hosted by Agio CEO, Bart McDonough
- Can Your Employees Handle an Attack Every 11 Seconds?
- Hashed Passwords Are Personal Information Under U.S. Law
- Healthcare’s Ransomware Exposure in the Time of COVID-19
- HIPAA Safe Harbor Bill Becomes Law & Incentivizes Security
- How to be a Healthcare BA and Not Lose 25 Million PHI Records
- National Health IT Week
- Ransomware Poses an Imminent Threat to U.S. Healthcare
- SEC Adopts Rules Permitting E-Signature Authorization
- Secure Electronic Health Record (EHR) Software
- Secure Medical Database Software
- Telehealth & COVID-19: The New Reality
- The Hidden ROI of HITRUST Certification
- What is a HIPAA violation?
- What Is HIPAA?
- Which Gaps Did Log4j Expose in Your Cybersecurity Governance?
- Why the Rosen-Cassidy Healthcare Cybersecurity Act May Fail
- Why Your HITRUST Certification is More Important Than Ever
Hedge Funds
- 4 Tips for Preventing a Hedge Fund Cyberattack
- 5 Creative Ways to Communicate with Microsoft Teams
- 5 Growing Cyber Risks Facing the Financial Sector This Year
- 5 Things You Didn’t Know About Microsoft SharePoint
- 6 Insider Tips for Microsoft Teams
- 7 Office Quirks We Miss Most
- A COO’s Strategic Roadmap to Navigating Cloud Partnerships
- A Hedge Fund CTO’s Guide to Navigating the Labyrinth of MSP Selection
- Agio CMDB: Triage for Your Technology
- Agio Cyber Risk Register: Your Governance Program in a Single Pane
- Agio’s 10-Year Anniversary: Letter from CEO, Bart McDonough
- AI Explained: 6 Takeaways from Our Webinar Hosted by Agio CEO, Bart McDonough
- All Things Cybersecurity from the SEC OCIE for 2020
- Are Portfolio Companies Ready for Business as Usual?
- Are You Ready for Ransomware as a Commercial Enterprise?
- Are You Using The Same Three Passwords From Five Years Ago?
- Benefits Hedge Funds Should Expect From a Transition to Multicloud
- Changes in Cybersecurity are Coming in 2022
- Common Due Diligence Questions Investors are Asking
- COVID: The Lingering Toll on Your Internal IT Help Desk
- CTOs are Choosing Agio for Penetration Testing Services. Here’s Why.
- Cyber Attack Severity Increasing In Hybrid Workplaces
- Cybersecurity & Compliance Regulation Best Practices in 2023
- Cybersecurity Checklist for Hedge Funds
- Cybersecurity Governance Best Practices
- Cybersecurity Risks for Hedge Funds
- DDQs for Alternative Investment Firms
- Hedge Fund Crown Jewel Data
- Hedge Funds Outsource as They Adopt AI & Migrate to the Public Cloud
- How Hackers Target Investors and How to Stay Safe
- How Hedge Funds Can Use Technology to Increase Efficiency
- How MFA Fatigue and Social Engineering Threaten Your Environment
- How to Properly Manage Passwords
- How To Protect Private Equity Firms From Wire Transfer Fraud
- If Someone Tells You AI Will Replace Your Human Support Team at Agio, They are Lying to You
- Insights from Hedge Fund CTOs: Cracking the Code of Hybrid Workforce Management
- Institutional Investors Embracing the Cloud & Stronger Cyber Controls
- Juice Jacking: The Scary New Threat to Your Phone’s Security
- Lessons from Abused TLDs: Understanding the Potential Dangers of the .zip TLD
- Managed Detection & Response for Hedge Funds
- Modernize Your Virtual Desktop Infrastructure for Better…Everything
- Phishing Attack Targets Financial Services Executives
- Preempting Cybersecurity Risks When Recency Bias Is Good
- Private Equity vs. Hedge Fund: Which Is Harder to Secure?
- Pros & Cons of Keeping Your Exchange Server with Office 365
- Proton Announces Proton Pass: The Next-Level Password Manager
- Ransomware Prevention, Simplified
- SEC Sanctions Eight Firms for Cybersecurity Procedures. Are You Next?
- SharePoint vs. On-Premise File Servers: Making the Case for SharePoint in Hedge Funds with Fewer than 15 Users
- Shift to Outsourcing to Counter Risks of Work-From-Anywhere
- Shifting Cyber Landscape Putting Insurance Coverages at Risk
- The CTO’s Checklist for Returning to the Office
- The Future of AI Cybersecurity Threats: How We’re Keeping Clients Safe
- The Great Resignation’s Lasting Impact on the Hedge Fund IT Support Model
- Threads Has Arrived. Here’s What You Need to Know.
- Top 3 Hedge Fund Cybersecurity Threats
- Top 3 Reasons Financial Firms are Outsourcing in 2023
- Truth About Public Wi-Fi: What You Don’t Know Can Hurt You
- Vendor Due Diligence Cybersecurity Checklist for New SEC Rules
- What COVID-19 Means for the Cyber-Operations of Hedge Funds
- What Is The Best Way to Lower Your IT Spend?
- What The New SEC Cyber Rules Mean for Hedge Funds
- Who Is Ultimately Responsible for Cybersecurity?
- Why are Cyberattacks Getting So Much Worse?
- Why It Makes Sense to Consolidate Managed IT and Security Operations
- Your Employees are Wasting 30% of Their Time Resetting Passwords
Managed IT
- 3 Pitfalls of IT Support (and the AI Innovations That Eliminate Them)
- 3-Step Blueprint to a Speedy Public Cloud Migration
- 4 Myths About Server Management, Debunked
- 4 Productivity Tips for Excel
- 5 Best Practices for Setting Up Your Azure Network
- 5 Common Mistakes to Avoid when Making a PowerPoint
- 5 Creative Ways to Communicate with Microsoft Teams
- 5 Technology Predictions from a CTO
- 5 Things You Didn’t Know About Microsoft SharePoint
- 6 Components of an Optimized Azure Infrastructure
- 6 Insider Tips for Microsoft Teams
- 7 Things to Avoid in Excel
- 7 Ways Agio Database Management Empowers Hedge Fund Managers
- Agio CMDB: Triage for Your Technology
- Agio’s 10-Year Anniversary: Letter from CEO, Bart McDonough
- Agio’s March Cybersecurity Password Playoffs: Secure 16
- AI Explained: 6 Takeaways from Our Webinar Hosted by Agio CEO, Bart McDonough
- Anti-Phishing Protection for Microsoft 365
- App Delays on iOS
- Are Your Users Happy with IT in a Work-From-Home Environment?
- Benefits Hedge Funds Should Expect From a Transition to Multicloud
- Calculating Net Working Days excluding Weekends and Holidays
- Can Your MSP Handle COVID-19?
- Cloud Considerations
- Coronavirus: How to Do Business as Usual When It’s Anything But
- COVID: The Lingering Toll on Your Internal IT Help Desk
- Data Protection Best Practices
- Debunking the Misconceptions of Consolidating IT and Cybersecurity Providers
- Employee Termination Checklist for IT
- FastTrack to Microsoft 365 with Agio
- Hedge Funds Outsource as They Adopt AI & Migrate to the Public Cloud
- Hindsight is 20/20: What CTOs Can Learn from COVID-19
- How Agio Securely Empowers Remote Users
- How Firms are Saving Time and Money with Agio Network Management
- How Has Your Business Continuity Plan Evolved as a Result of COVID-19?
- How MFA Fatigue and Social Engineering Threaten Your Environment
- How Microsoft Intune and Conditional Access Keep Endpoints Secure
- How the Top CTOs Got Ahead with Desktop as a Service
- How to Add Buttons to Excel to Run Scripts
- How to Add Custom Events Directly in Outlook
- How to Add Multiple Time Zones to Your Outlook Calendar
- How to Back Up and Sync SharePoint
- How to Block Certain Websites Using Your iPhone
- How to Boost Productivity with Microsoft 365
- How to Bulk Combine PDF Files to Excel Without Losing Formatting
- How to Change Email Preview Length in Outlook
- How to Check Your Formulas with Value Preview ToolTips in Excel
- How to Choose Managed IT Services
- How to Choose the Right Managed Service Provider (MSP)
- How to Create and Use Excel Macros
- How to Easily Migrate All Files in Your Folders to a New Computer
- How to Get Better at Financial Analysis Using Excel
- How to Hide Apps for iOS
- How to Merge Excel Files with Different Headers in Power Query
- How to Move to the Cloud
- How to Mute Conversations in Microsoft Teams
- How to Properly Handle Date Grouping in Excel PivotTables
- How To Protect Private Equity Firms From Wire Transfer Fraud
- How to Reduce IT Costs
- How to Safely Download Files in SharePoint
- How to Safely Manage Data
- How to Safely Share Files in SharePoint
- How to Schedule Notifications on iOS
- How to Search for Emails Using Outlook
- How to Send Form Responses to Outlook with Power Automate
- How to set an iPhone permanently on Do Not Disturb
- How to Set Different Focus Home Screens in iOS Depending on the Time and Your Location
- How to Start a Private Equity Firm
- How to Turn Off Raise to Wake on iOS
- How to Use the LOOKUP Function in Excel
- If Someone Tells You AI Will Replace Your Human Support Team at Agio, They are Lying to You
- Importance of Client Feedback on Improving Service
- Is an Azure MSP Right for Your Business?
- Is Your Cybersecurity Really Covered? 7 Questions to Ask Your MSP
- IT and Cybersecurity Teams Need to Work Together
- Lessons from Abused TLDs: Understanding the Potential Dangers of the .zip TLD
- Microsoft 365 vs. Google Workspace: Making the Right Choice for Your Firm
- Microsoft Azure Basics: What the Platform Can Do for You
- Microsoft Azure Increases Your Productivity
- Microsoft Azure’s Vulnerability Discovery — and Best Practices for Azure Security
- Microsoft Trusted Launch Coming to an Azure VM Near You
- Modernize Your Virtual Desktop Infrastructure for Better…Everything
- Patch Management in the New COVID-19 Normal
- Pros & Cons of Keeping Your Exchange Server with Office 365
- Quest for Better IT and Cybersecurity: AI + Human Brilliance from Agio
- Reasons Why You Need Database Management
- Revolutionizing the MSP Industry
- SEC Sanctions Eight Firms for Cybersecurity Procedures. Are You Next?
- SharePoint vs. On-Premise File Servers: Making the Case for SharePoint in Hedge Funds with Fewer than 15 Users
- Shift to Outsourcing to Counter Risks of Work-From-Anywhere
- The 10 Best Keyboard Shortcuts for Microsoft
- The Future of IT Consulting
- The Most Common Excel Errors and How to Fix Them
- The When & Why for MongoDB
- Thinking About Cloud Migration? Make Sure Your Applications Handle it
- To Patch or Not to Patch During COVID-19?
- Top 3 Reasons Financial Firms are Outsourcing in 2023
- Turning Challenges into Change: Financial Services COOs 2024 Outlook
- Turning Challenges into Change: Financial Services CTOs IT and Cyber Perspective for 2024
- Turning Challenges into Change: Hedge Fund CFOs’ Agenda for 2024
- What is a Database Management System?
- What Is Network Management?
- What Is The Best Way to Lower Your IT Spend?
- What to Expect From a Help Desk
- When to Use Heat Maps in Excel
- Why are Cyberattacks Getting So Much Worse?
- Why Are Software Updates and Patches Important?
- Why Do Clients Call Us?
- Why iPhone Lockdown Mode Is a Must for C-Suite Cyber Risk Management
- Why It Makes Sense to Consolidate Managed IT and Security Operations
- Why Top CTOs Care About IT Governance
- Why your accidental DBA strategy isn’t good enough
- You’re in the Public Cloud, Now What?
- Your Network is Only as Secure as Your Vendors’ Networks
- Your On-Prem Migration to Agio Managed Azure
- Your SQL Server 2008 and 2008 R2 are No Longer Receiving Security Updates
- Your Top 5 DBA Mistakes
Private Equity
- 4 Tips for Preventing a Hedge Fund Cyberattack
- 5 Creative Ways to Communicate with Microsoft Teams
- 5 Growing Cyber Risks Facing the Financial Sector This Year
- 5 Things You Didn’t Know About Microsoft SharePoint
- 6 Insider Tips for Microsoft Teams
- 7 Office Quirks We Miss Most
- A COO’s Strategic Roadmap to Navigating Cloud Partnerships
- A Hedge Fund CTO’s Guide to Navigating the Labyrinth of MSP Selection
- Agio CMDB: Triage for Your Technology
- Agio’s 10-Year Anniversary: Letter from CEO, Bart McDonough
- Agio’s March Cybersecurity Password Playoffs: Secure 16
- AI Explained: 6 Takeaways from Our Webinar Hosted by Agio CEO, Bart McDonough
- Are Portfolio Companies Ready for Business as Usual?
- Are You Ready for Ransomware as a Commercial Enterprise?
- Are You Using The Same Three Passwords From Five Years Ago?
- Are Your Portfolio Companies Vulnerable to COVID-19 Phishing Scams?
- Changing Threat of Email Attacks on Private Equity Firms
- Common Due Diligence Questions Investors are Asking
- COVID: The Lingering Toll on Your Internal IT Help Desk
- CTOs are Choosing Agio for Penetration Testing Services. Here’s Why.
- Cyber Attack Severity Increasing In Hybrid Workplaces
- Cybersecurity & Compliance Regulation Best Practices in 2023
- Cybersecurity Checklist for Private Equity Firms
- Cybersecurity Governance Best Practices
- DDQs for Alternative Investment Firms
- Here are the Top 3 Portfolio Company Cybersecurity Risks
- How Hackers Target Investors and How to Stay Safe
- How MFA Fatigue and Social Engineering Threaten Your Environment
- How the Most Secure Private Equity Firms Manage Deal Data
- How to Properly Manage Passwords
- How To Protect Private Equity Firms From Wire Transfer Fraud
- How to Start a Private Equity Firm
- If Someone Tells You AI Will Replace Your Human Support Team at Agio, They are Lying to You
- Insights from Hedge Fund CTOs: Cracking the Code of Hybrid Workforce Management
- Institutional Investors Embracing the Cloud & Stronger Cyber Controls
- Juice Jacking: The Scary New Threat to Your Phone’s Security
- Lessons from Abused TLDs: Understanding the Potential Dangers of the .zip TLD
- Modernize Your Virtual Desktop Infrastructure for Better…Everything
- Phishing Attack Targets Financial Services Executives
- Preempting Cybersecurity Risks When Recency Bias Is Good
- Private Equity vs. Hedge Fund: Which Is Harder to Secure?
- Pros & Cons of Keeping Your Exchange Server with Office 365
- Proton Announces Proton Pass: The Next-Level Password Manager
- Ransomware Prevention, Simplified
- SEC Sanctions Eight Firms for Cybersecurity Procedures. Are You Next?
- Shift to Outsourcing to Counter Risks of Work-From-Anywhere
- Shifting Cyber Landscape Putting Insurance Coverages at Risk
- Strengthen Your Private Equity Investments with Agio’s Comprehensive Cybersecurity Solutions
- The CTO’s Checklist for Returning to the Office
- The Future of AI Cybersecurity Threats: How We’re Keeping Clients Safe
- The Time We Hacked a Private Equity Firm…from Their Lobby
- Threads Has Arrived. Here’s What You Need to Know.
- Top 3 Reasons Financial Firms are Outsourcing in 2023
- Truth About Public Wi-Fi: What You Don’t Know Can Hurt You
- What Is The Best Way to Lower Your IT Spend?
- What The New SEC Cyber Rules Mean for Hedge Funds
- Who Is Ultimately Responsible for Cybersecurity?
- Why iPhone Lockdown Mode Is a Must for C-Suite Cyber Risk Management
- Why It Makes Sense to Consolidate Managed IT and Security Operations
- Your Employees are Wasting 30% of Their Time Resetting Passwords
- Your Portfolio Companies are Under Siege
Uncategorized
- Ensuring Responsible Usage of ChatGPT: A Call to Action for all Financial Service Firms
- Hedge Fund CFO and CCO Perspectives on Adopting the Right SEC Cybersecurity Compliance Approach
- How to Choose the Right 24/7 Help Desk
- How to Complete a Network Build-Out at a New Office
- How to Use Excel Check Boxes
- New Email from Evil Corp
- SEC’s Final Rule for Public Companies on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure
- The Best IT System Management Tools
- What Is a Managed Service Provider?
- What Is the Dark Web?
Watch Commander's Log
- A Deep Dive into Agio’s Tech Stack: OpenAI, FastAPI, and Azure Functions for AI Product Development
- Adapting to Meet Phishing Challenges
- Hacking Awareness & Alternate Data Streams (ADS)
- Mr. Cisco’s Advanced Phishing Attempt
- New Email from Evil Corp
- Security Operations Centers are Only as Good as a Company’s Culture
- The Rise of IoT Botnet Attacks
- The Watch Commander’s Log for May 6th, 2020