Technology Insights Blog

Jon Roberts

Jon Roberts

Jon is the Director of Cyber Operations with Marco, overseeing the implementation of Marco’s managed IT offerings, security consulting engagements, and incident response. Jon has been with Marco since 2017 and transitioned to his current role in 2022. Jon works closely with Marco’s clients to identify risks facing their organization and design solutions to improve their security posture.
Find me on:

Holiday Cybersecurity Best Practices

By: Jon Roberts
November 18, 2022

It’s tough to find someone who doesn’t enjoy the holiday season. Unfortunately, cybercriminals love them for many of the same reasons we do. We’re traveling more, we’re busy and distracted, we buy more online from merchants we don’t know well, and we’re especially inclined to giv…

Read the Full Story

Why Care About Multi-Factor Authentication?

By: Jon Roberts
November 14, 2022

It’s safe to say that Multi-Factor Authentication (MFA) isn’t popular. According to Microsoft, only 22% of their enterprise customers use it, and many people seem to associate it with annoyance. Unfortunately, strong and unique passwords just don’t cut it anymore, and if we’re be…

Read the Full Story

The Top Cybersecurity Threats for Small Business

By: Jon Roberts
October 12, 2022

Many smaller organizations don’t consider themselves to be a target of cybercriminals. The “we’re too small to be worth it” mindset may be somewhat true for many forms of crime, but unlike most physical security threats, the most common cyberattacks are executed in bulk quickly a…

Read the Full Story

Are VPNs Obsolete Technology?

By: Jon Roberts
September 23, 2022

Too soon? You might have guessed that if this question is being asked by tech pros, the answer is probably yes. I recognize this might be unwelcome news for many. A VPN, or Virtual Private Network, looked like the clear choice for a lot of companies looking to accommodate hybrid …

Read the Full Story

What You Need to Know About Recent Apple Updates for Vulnerability

By: Jon Roberts
August 22, 2022

Have you updated the software on your Apple device lately? If not, look for any new software updates and install them…now. While your new software is downloading, I’ll explain what this update is for and why it’s important to install new software updates as soon as they’re availa…

Read the Full Story

What Is Your Incident Response Plan?

By: Jon Roberts
August 10, 2022

What is your Incident Response Plan? An Incident Response Plan (IRP) should contain everything your organization will do in the event of a security incident. A Disaster Recovery Plan (DRP) and an IRP are essential components of a Business Continuity Plan (BCP).

Read the Full Story

What Is Smishing and Why Is It a Problem?

By: Jon Roberts
July 27, 2022

Smishing is much like traditional phishing scams, except these messages are sent by text (SMS) instead of email. Typical smishing messages urge recipients to click on a link that scammers say will contain a survey, a prize, or urgent information about a bank account or credit car…

Read the Full Story

Mobile Device Security 101

By: Jon Roberts
June 10, 2022

As hybrid and remote work soared during the pandemic, so too did the use of mobile devices. Finally workers could access sophisticated digital tools from anywhere, and on any device. With the right security tools and procedures in place, it’s a win/win for businesses that needed …

Read the Full Story

How Cybersecurity Training Helps Mitigate Risk to Businesses

By: Jon Roberts
June 2, 2022

Many organizations have undertaken admirable efforts to beef up their cybersecurity, but it may not be enough. According to a recent report, the average amount of time organizations take to detect and contain a data breach is 287 days…one week longer than the previous year.

Read the Full Story

Is It Dangerous For Your Business to Use Outdated Software?

By: Jon Roberts
May 23, 2022

The short answer is yes…very. Hackers routinely find and exploit vulnerabilities in software that will allow them to attack your sensitive data and critical infrastructure. Cybercrime has escalated rapidly in the past few years, and the more success cybercriminals have, the more …

Read the Full Story
Previous
Subscribe to Our Blog