Tech Talk

Byte sized tech advice for businesses.

Read the Guide

How to Approach Risk Assessments at Your Organization

Risk assessment is a key facet of organizational security. While some businesses may need to undergo a type of assessment in order to ensure compliance, others may be motivated by the thought of increasing security and safeguarding against threats. Whichever category your company falls into, performing a risk assessment can be extremely helpful to keep... Read More

Dan Carpenter
February 1, 2023
7 min read

Digital Security Controls to Address Risk in Business Systems

Is your organization taking the right approach to risk management? Learn how you can reduce cyber threats, protect data, and defend against cyberattacks. Read More

Ray Gasnick III
August 28, 2024
11 min read

Best Practices for Organizational Security in 2024

There are many steps we can take to strengthen your organization’s security in the new year. Review our recommended approaches so your business is protected. Read More

Dan Carpenter
December 8, 2023
10 min read

Systemplicity: 3 Ways You May Be Inadvertently Increasing Your Cyber Security Risks!

Learn why overly complicated systems can create security issues for your business and discover scans and tests you can perform to identify vulnerabilities. Read More

John Horner
October 6, 2023
10 min read

Best Practices for Multi-Factor Authentication (MFA)

With bad actors finding new ways to target businesses and their employees, taking steps to secure systems can help reduce the likelihood of a breach or attack at your organization. Many SMBs may think their organization is too small and not considered a target by cybercriminals. Yet, 43% of breaches occur in companies with 250... Read More

Ray Gasnick III
August 3, 2023
13 min read

Securing Success: A Deep Dive Into SOC 2 Compliance and Pen Testing

SOC 2 compliance plays a pivotal role in communicating and ensuring your organization’s security. Undergoing an audit allows you to instill trust in customers, vendors, and partners while building up your security posture. This article will share the significance of SOC 2 compliance, its specific requirements, and the meticulous audit process. Additionally, we’ll delve into... Read More

Dan Carpenter
May 17, 2023
9 min read

Helpful Cyber Security Terms Business Owners Should Know

Cyber security should be top-of-mind for any business owner. Engaging in necessary discussions with your staff, vendors, and service providers can ensure you follow proper procedures and protect important assets. A strong working vocabulary can help make these conversations easier and clearer for everyone involved. As with any industry, the cyber world has its jargon—a... Read More

Dan Carpenter
March 31, 2023
10 min read

Key Reasons Why Microsoft 365 Backup is Essential

Microsoft 365 is an effective solution for collaboration and communication, whether you’re working remotely or in person. The variety of tools in this suite delivers a collaborative environment that is easily accessible from any location and device. It sounds like an excellent fit for the majority of businesses working online. However, with millions of users... Read More

Dan Carpenter
October 19, 2022
13 min read

Ransomware vs. Malware: What’s the Difference?

Ransomware and malware are often talked about in the same context, but they have different meanings. All ransomware is malware, but not all malware is ransomware. Malware, or malicious software, refers to any type of software created by cybercriminals to gain access to systems or access data. Malware includes everything from computer viruses to keyloggers.... Read More

Dan Carpenter
October 3, 2022
11 min read

Cyber security insurance: what is it and does your business need it?

No matter its size, any business is vulnerable to a cyber attack. In fact, 43% of breaches occur at companies with 250 employees or less. Of those organizations, 61% go out of business within the first year after the attack. One way to protect your business in the event of a cyber attack is to... Read More

Dan Carpenter
February 16, 2022
8 min read

What is a supply chain cyber attack?

A supply chain cyber attack (aka vendor email compromise, or VEC) is an email cyber-attack strategy targeting companies doing business in today’s global supply chain management measured in the tens of billions of dollars a year and growing. Read More

Dan Carpenter
December 15, 2021
7 min read

Accused of copyright infringement? It could be a phishing scam.

When using images found online, it’s not always 100% clear what can be used, how it can be used, and if accreditation is necessary. Read More

Dan Carpenter
December 8, 2021
4 min read

Today’s SMB cyber security MUSTS

Cyber threats are at an all-time high, and smaller organizations continue to bear the brunt of the assault for two main reasons. The good news for SMBs: it doesn't have to be this way. Read on, and I’ll tell you precisely what you can do now to reduce your attack profile and make your business less likely to get caught. Read More

Dan Carpenter
November 17, 2021
8 min read