Skip to content

Search Marco

    Technology Insights Blog

    Jon Roberts

    Jon Roberts

    Jon is the Director of Cyber Operations with Marco, overseeing the implementation of Marco’s managed IT offerings, security consulting engagements, and incident response. Jon has been with Marco since 2017 and transitioned to his current role in 2022. Jon works closely with Marco’s clients to identify risks facing their organization and design solutions to improve their security posture.
    Find me on:

    What Is Smishing and Why Is It a Problem?

    By: Jon Roberts
    July 27, 2022

    Smishing is much like traditional phishing scams, except these messages are sent by text (SMS) instead of email. Typical smishing messages urge recipients to click on a link that scammers say will contain a survey, a prize, or urgent information about a bank account or credit car…

    Read More

    Mobile Device Security 101

    By: Jon Roberts
    June 10, 2022

    As hybrid and remote work soared during the pandemic, so too did the use of mobile devices. Finally workers could access sophisticated digital tools from anywhere, and on any device. With the right security tools and procedures in place, it’s a win/win for businesses that needed …

    Read More

    How Cybersecurity Training Helps Mitigate Risk to Businesses

    By: Jon Roberts
    June 2, 2022

    Many organizations have undertaken admirable efforts to beef up their cybersecurity, but it may not be enough. According to a recent report, the average amount of time organizations take to detect and contain a data breach is 287 days…one week longer than the previous year.

    Read More

    Is It Dangerous For Your Business to Use Outdated Software?

    By: Jon Roberts
    May 23, 2022

    The short answer is yes…very. Hackers routinely find and exploit vulnerabilities in software that will allow them to attack your sensitive data and critical infrastructure. Cybercrime has escalated rapidly in the past few years, and the more success cybercriminals have, the more …

    Read More

    30 Ways to Secure Microsoft 365

    By: Jon Roberts
    April 15, 2022

    Generally speaking, Microsoft 365 is a highly secure platform that helps organizations boost productivity and collaboration. Its data centers are almost impossible to breach directly, and it includes a suite of cybersecurity tools to further safeguard sensitive data. However, as …

    Read More

    Is Your Staff Vulnerable to Phishing Scams?

    By: Jon Roberts
    March 25, 2022

    "We've noticed suspicious withdrawals from your account. Click this link immediately to verify your information, or your account will be suspended." Would you ever fall for this common phishing technique, or perhaps another one like it? According to Avast, 61% of Americans are hi…

    Read More

    Cybersecurity Trends for Small Businesses

    By: Jon Roberts
    March 14, 2022

    If you have a small business and haven't yet been the victim of a cybercrime, that doesn't necessarily mean you're safe. It probably just means you've been lucky. In the last few years, cyber attacks on small businesses have been increasing in frequency and also severity. In fact…

    Read More

    How to Recognize SPAM and Phishing: Email Security and Beyond

    By: Jon Roberts
    March 2, 2022

    It's been a hectic day. You're multitasking as best you can, but you aren't at your best, and you can't focus on any one thing. And that's exactly when it happens. You skim over an email that says your HR department sent out incorrect W-2s, and you need to verify your information…

    Read More

    What is Cybersecurity for Business?

    By: Jon Roberts
    February 22, 2022

    You need your tools and your data to be accessible to everyone in your organization. But the more accessible they are for your employees, the more accessible they can be for cyber criminals. Cybersecurity threats have been increasing exponentially in recent years, and not just fo…

    Read More

    Protecting Your Organization from Log4j Vulnerability

    By: Jon Roberts
    December 17, 2021

    The race is on as security teams around the world work diligently to fix a critical security flaw named Log4Shell, which has put organizations across every industry at risk of exploitation.

    Read More
    Previous
    Subscribe to Our Blog