Kevin Howarth
Filter by
Blog
|
3 Min Read
3 Unexpected Ways the Updated FTC Safeguards Rule Will Trip Up CPA Firms
The updated FTC Safeguards Rule now includes specific requirements that a CPA firm’s information security plan must con...
Read More
Blog
|
4 min read
IT Spending Benchmarks: Too Much, Too Little, Or Just Right
Some organizations overspend and get frustrated by a lack of return. Others sink into technical debt by underspending an...
Read More
Blog
|
1 min read
Cybersecurity Checklist for Municipalities: Where to Begin?
"Where do I begin with cybersecurity?" It's one of the most common questions we get from municipalities. To answer this ...
Read More
Blog
|
5 Min Read
10 Cloud Backup and Archiving Myths
Businesses want to protect their sensitive data, but some treat backup and archiving as an afterthought. Here are 10 myt...
Read More
Blog
|
4 min read
Securing Remote and Home Work Environments
As our work environment extends to include our homes and other remote settings, the cyber risks associated with these ch...
Read More
Blog
|
6 Min Read
Is Your Wealth Management Firm Ready When the SEC Comes Knocking?
The SEC has added more cybersecurity requirements. If the SEC walked into your office for an audit today, would you be p...
Read More