 
            Kevin Howarth
Filter by
 
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  10 Min Read
                              
                              The Evolution of Artificial Intelligence in Cybersecurity
                                  In the ever-evolving landscape of technology, few fields have garnered as much attention and intrigue as Artificial Inte...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  3 Min Read
                              
                              3 Unexpected Ways the Updated FTC Safeguards Rule Will Trip Up CPA Firms
                                   The updated FTC Safeguards Rule now includes specific requirements that a CPA firm’s information security plan must con...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  4 min read
                              
                              IT Spending Benchmarks: Too Much, Too Little, Or Just Right
                                  Some organizations overspend and get frustrated by a lack of return. Others sink into technical debt by underspending an...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  1 min read
                              
                              Cybersecurity Checklist for Municipalities: Where to Begin?
                                  "Where do I begin with cybersecurity?" It's one of the most common questions we get from municipalities. To answer this ...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  5 Min Read
                              
                              10 Cloud Backup and Archiving Myths
                                  Businesses want to protect their sensitive data, but some treat backup and archiving as an afterthought. Here are 10 myt...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  4 min read
                              
                              Securing Remote and Home Work Environments
                                  As our work environment extends to include our homes and other remote settings, the cyber risks associated with these ch...
                              
                              
                              Read More