Many organizations are realizing that sometimes their weakest link regarding cybersecurity is not found within their organization but in their supply chain or with their vendors.  With their data not being within their organization it is hard to get visibility into the hygiene of the data.    The great thing is there are Risk

By Gary Audin

You have adverse events that hamper or stop your IT and network operations. There are power outages, fires, floods, and security attacks. But you must also deal with interruptions due to new application installation, software upgrades that fail, data base changes,

Multi-factor authentication (MFA) is an authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence to authenticate themselves.  These authentication methods have

Frank Ohlhorst and Harry Brelsford revisit the analytics conversation.  They tie the conversation to the current economic status and pandemic taking place.  When you couple data and analytics you can come to the conclusion on where to drive your business helping to build big profits.

We met with IAMCP chapter president Danny Brown, to chat about Microsoft Inspire. Inspire is Microsoft’s worldwide partner conference. Typically, companies involved in Microsoft’s Partner Network travel from around the world to spend a week meeting with other partners, attending various sessions and keynotes led

Managed Services Providers (MSPs) are hyper focused on generating new sources of revenue to generate badly needed cash to survive the current economic correction. In part one of this series on Third Party Maintenance (TPM), we painted the

Phelim Rowe joins Harry Brelsford to explore privacy with Data.  Phelim explores GDPR and the California privacy act and how it affects your data.  He then goes onto to talk about why companies collect certain information

More Articles ...