 
            Kevin Howarth
Filter by
 
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  6 Min Read
                              
                              Risk, Regulations, and Resilience: Strengthening Cybersecurity in Nonprofit...
                                  Strengthen cybersecurity in nonprofit healthcare by going beyond HIPAA compliance. Learn essential risk assessment steps...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  3 Min Read
                              
                              Is Your Municipality Compliant with CJIS’s Updated MFA Security Policy?
                                  This new CJIS MFA mandate enhances security by ensuring that only authorized personnel can access sensitive law enforcem...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  3 min read
                              
                              Password Management Techniques
                                  Weak passwords are one of the most significant vulnerabilities for businesses of all sizes. While you can pour money int...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  5 Min Read
                              
                              Hiring a Full-Time IT Employee: Not a Good Investment for Smaller Municipal...
                                  We’ve found through experience that the disadvantages of hiring a full time IT employee usually outweigh the few advanta...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  8 Min Read
                              
                              7 Information Technology (IT) Buzzwords You Can’t Afford to Ignore in 2025
                                  We’ve compiled a list of 7 IT buzzwords you’ve probably heard. However, you may not know exactly what they mean, why the...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  10 Min Read
                              
                              7 Ways You Could Be Overspending on IT (And Action Items For How to Reduce ...
                                  Through consulting with hundreds of small and middle-sized businesses, we’ve found that there are seven main hot spots f...
                              
                              
                              Read More