 
            Kevin Howarth
Filter by
 
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  3 Min Read
                              
                              [Video] VC3 Answers Your FTC Safeguards Rule Questions
                                  Cole Two Bears, VC3’s Director of Managed Security, recently discussed some of the most frequently asked questions from ...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  5 min read
                              
                              Why do hackers hack?
                                  Everyone has an idea of what hackers do. Popular culture is full of images of hooded figures hunched over a monitor, ill...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  5 Min Read
                              
                              The Importance Of A VCIO For Developmental Disability Organizations
                                  Elevate your organization’s technology expertise and efficiency in Ohio with our expert IT leadership.
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  4 Min Read
                              
                              How Hackers Steal Information
                                  Discover the Threat: Unveiling How Hackers Target Ohio’s Developmental Disability Organizations. Learn How to Protect Yo...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  5 Min Read
                              
                              Cybersecurity Month – Crucial Tips and Insights
                                  Embrace cybersecurity awareness, safeguard sensitive information, and bolster digital safety, focusing on the unique nee...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  3 Min Read
                              
                              Continuous Cybersecurity Monitoring vs Penetration Testing for FTC Safeguar...
                                  3 reasons why you’ll want continuous monitoring (vs. penetration testing alone) as your primary method of meeting the FT...
                              
                              
                              Read More