Skip to content

Search Marco

    Technology Insights Blog

    Zero Trust: Three Must-Have Components

    By: Mike Burgard
    October 15, 2020

    In a previous blog, I provided a general introduction to zero trust and explained why so many organizations are moving to this new security paradigm. As a follow-up, I’ll offer a deeper dive into some of the main components that make up a zero trust solution. There are a number o…

    Read More

    Zero Trust: Why Companies Are Switching To A New Security Paradigm

    By: Mike Burgard
    September 28, 2020

    You may be hearing the term "Zero Trust" more often these days. Though the concept has been around for years, it’s gained more traction since the mass migration of employees working remotely. Zero trust centers around a strict methodology that requires everyone and everything try…

    Read More

    Don’t Limit Linda: Namaste Out of This [Video]

    By: Mike Burgard
    March 27, 2020

    What was the last mistake you made at work? How long ago was it? And even more importantly, how BIG of a mistake was it? If I’ve learned anything, it’s that mistakes come in all shapes and sizes, and everyone makes them. Now, whether or not they tell anybody, that’s another story…

    Read More

    Network Security Measures Protect Before, During and After an Attack

    By: Clay Ostlund
    March 19, 2020

    The web has done wonders for business in the 21st century, connecting remote offices and giving employees the freedom to work on the go and boost productivity, whether they're in the office or at home. With this expansion and growth comes increasing concerns over network security…

    Read More

    Understanding the Impact of a Security Incident

    By: Mike Burgard
    October 24, 2019

    Large cyber hacks have been a major source of news in recent years. Some major breaches in recent years include JP Morgan Chase - 76 million (2014), Equifax - 143 million (2017), Fortnite - 250 million records (2019). Even FEMA, a federally-regulated government organization, leak…

    Read More

    Internal IT Security Policies: What You Need to Know to Keep Your Business Safe

    By: Mike Burgard
    October 3, 2019

    Wouldn’t it be a wonderful world if nobody messed with your stuff? You could leave your bike unlocked outside of Starbucks; keep your car keys in the ignition; never worry about hackers getting into your private personal and business information. Since that day isn’t happening an…

    Read More

    Business Security Do's and Don'ts [Infographic]

    By: Mike Burgard
    September 20, 2019

    Protecting businesses from security threats is an ongoing battle for today’s businesses. Small and medium-sized businesses across the nation continue to be prime targets for cybercriminals preying upon those who don’t have a strong handle on their security. So, how does a busines…

    Read More

    6 Ways Small and Medium-Sized Businesses Are Vulnerable to Cyber Attacks

    By: Mike Burgard
    August 6, 2019

    Is your small business protected from cyber attacks? As businesses continue to rely more and more on technological advances and integrate new technologies into their network, their risk continues to rise. As a whole, businesses are unaware of the many ways they are vulnerable, an…

    Read More

    IT Security Best Practices for Today’s Businesses

    By: Trevor Akervik
    June 18, 2019

    It’s true. Technology is always changing. Sometimes, technology changes in small, incremental ways, and at other times, it makes big shifts in what can seem like the blink of an eye. With technology in a constant state of change, it can be difficult for businesses to know they’re…

    Read More

    3 Common Work Tasks IoT Completes

    By: Steve Knutson
    October 26, 2017

    We’re connected – all the time – and I’m not just talking about email and phone calls. I thought about this as I walked into my family’s business and the song I was listening to in my truck came on in the building. It was not coincidence. It’s because of the phone in my pocket.

    Read More
    Previous All posts
    Subscribe to Our Blog