What Kind of Cybersecurity Assessment is Right for You? BlogCybersecurityServices What Kind of Cybersecurity Assessment is Right for You?By Chris Reid, Cybersecurity Strategist Penetration testing. Maturity Assessment. Risk Assessment. Gap Analysis. Framework Assessment.…DNA WebDevApril 20, 2023
What the GoDaddy Multi-Year Attack Should Teach Us About Phishing Awareness Training BlogCybersecurityServices What the GoDaddy Multi-Year Attack Should Teach Us About Phishing Awareness TrainingBy Jared Hrabak, Consulting Cybersecurity Engineer Whether you’re relatively new to your cybersecurity role or…DNA WebDevMarch 30, 2023
Key Benefits of Hiring a Managed Detection and Response (MDR) Provider BlogCybersecurityServices Key Benefits of Hiring a Managed Detection and Response (MDR) ProviderBy Chris Reid, Cybersecurity Strategist In today’s world with a multitude of different security services,…Andrea HillMarch 6, 2023
Microsoft 365 Security, Governance, and Compliance BlogCybersecurityServices Microsoft 365 Security, Governance, and ComplianceBy Jason Lane, Cloud Manager Do you have concerns over your current security posture and…Andrea HillFebruary 13, 2023
The Continuing Evolution of Endpoint Security AI - Artificial IntelligenceBlogCybersecurity The Continuing Evolution of Endpoint SecurityBy Andrew Roberts, MicroAge Chief Cybersecurity Strategist Endpoint security continues to be one of the…Andrea HillJanuary 11, 2023
Key Benefits of a Hybrid Cloud Model for Business Continuity & Disaster Recovery BlogCloud TransformationCybersecurity Key Benefits of a Hybrid Cloud Model for Business Continuity & Disaster RecoveryBy Rob Heath, Solutions Architect Between an onslaught of ransomware cases and an unusually high…Andrea HillJanuary 3, 2023
Understanding the 6 Elements of the Incident Response (IR) Process BlogCybersecurity Understanding the 6 Elements of the Incident Response (IR) ProcessBy Jared Hrabak, Consulting Cybersecurity Engineer From Framework to Building an Incident Response Plan Thirty…Andrea HillDecember 12, 2022
Utilizing Secure Access Service Edge (SASE) To Protect Your Remote Workers BlogCybersecurityServices Utilizing Secure Access Service Edge (SASE) To Protect Your Remote WorkersBy Tim McCulloch, Vice President of Solutions Architecture During the peak of the COVID-19 pandemic,…MicroAgeOctober 21, 2022
Let a Cybersecurity Framework Be Your Guide to Success BlogCybersecurity Let a Cybersecurity Framework Be Your Guide to SuccessBy Andrew Roberts, Chief Cybersecurity Strategist Building an effective information security program is a journey.…MicroAgeOctober 13, 2022