Kevin Howarth
Filter by
Blog
|
6 min read
Dissecting a Phishing Email: 6 Ways Scammers Trick City Employees
According to a recent study by Positive Technologies, As expected, the most successful social engineering technique is ...
Read More
Blog
|
3 Min Read
How Technology Checklists Take You to the Next Level
Integrating technology checklists as part of how you deliver your IT services and IT security processes can help make co...
Read More
Blog
|
5 Min Read
How to Increase Your Application Security
It’s imperative for every registered investment advisor to do everything within your power to increase application secur...
Read More
Blog
|
4 Min Read
Why Software Management is Critical to Your Cybersecurity
Software asset management (SAM) is an integral component of every organization’s cybersecurity efforts. Every piece of s...
Read More
Blog
|
4 min read
Taking Down Your Business
What would happen if you had a multi-location hospitality business and had to close multiple locations? If a possible da...
Read More
Blog
|
4 min read
Data Backup: Not the Only Answer to Ransomware and Viruses
During the past few months at various events and conferences in multiple states, we have seen cities taking ransomware s...
Read More