Greater Cincinnati ISACA Chapter Meeting – April 4th, 2023

Security vs Compliance: Striking the Right Balance The terms Security and Compliance are often used interchangeably and they are two related but distinct concepts. You can be secure without being compliant or you can be compliant without really being secure. While security and compliance share similar goals of protecting an organization’s assets, they differ in…

Read More

What Is an Insider Threat in Cyber Security?

insider threat faq

An insider threat in cyber security originates from someone who works in your organization or has inside access to your networks, such as a vendor, client or former employee. Insider threats account for an estimated one-third (33 percent) of all cyber attacks. This type of threat is becoming a growing concern, increasing as much as…

Read More

ChatGPT Workshop to Radically Revolutionize Your Business

Learn ChatGPT to Revolutionize Your Business - Workshop

Learn ChatGPT and other AI tech in 1 Day to Radically Revolutionize Your Business  In this one-day radical transformation workshop, you will learn about ChatGPT, an amazing artificial intelligence model developed by OpenAI. Discover the basics of how ChatGPT works and how to use it to improve various aspects of your business, including customer service,…

Read More

Azure vs AWS: Which Should I Choose?

Azure vs Aws

The Azure vs AWS debate is a complex one to handle. You’re likely thinking about which cloud architecture of the two is right for your business.  Both platforms are well-established: Azure has been around since 2010 and AWS has been kicking since 2006. Azure was developed by Microsoft, while AWS was developed by Amazon. In…

Read More

8 Best Cloud Organization Tips (And Why You Should Use Them)

Cloud Organization Tips

The cloud makes it easy to share, store and manage files, but without routine maintenance, it can become messier than a department store on Black Friday. As a managed service provider, this isn’t our first rodeo. The good news is there are several best practices for cloud organization that you can use to streamline your…

Read More

Reply Chain Phishing Attacks: Protect Your Business

Reply Chain Phishing Attacks

Did you know that phishing is still the primary method for cyber attacks? Protecting yourself and your business from threats like reply chain phishing attacks is important to the health and viability of your business. For remote workers, cyber security is particularly critical in their day-to-day work.  With hackers getting more sophisticated, it can be…

Read More

6 Tech Tools to Stop Using in 2023

6 Tech Tools Past Their Due Date in 2023 (1)

Technology is ever-changing. As new products emerge or innovations offer improvements on older ones, it’s no wonder many become obsolete or unusable. It’s hard to know which tech tools to stop using to enable your organization’s digital transformation. What may have been a popular tech tool in the past may now be vulnerable to cyberattacks…

Read More

Is It Time for a New IT Partner in 2023?

New Year, New IT Partner

Threat actors have successfully harmed many small and medium-sized businesses (or SMBs) over the past several years. SMBs have had a wake up call. Many are finally getting the message that cybercriminals see smaller businesses with relatively low staff as easy targets because they often don’t invest in the right cyber security.  A recent survey…

Read More