 
            Kevin Howarth
Filter by
 
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  2 Min Read
                              
                              The AI-Generated Voice Scam: A New Threat To Watch Out For
                                  In recent years, scammers have increasingly used artificial intelligence (AI) technology to create sophisticated scams, ...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  4 Min Read
                              
                              End Users Pose the Biggest Risk to Your Operation
                                  More and more organizations are applying for cyber insurance and not qualifying. The technical requirements that underwr...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  5 Min Read
                              
                              The Upcoming End of Windows Server 2012 Support Puts Your Organization at G...
                                  You probably don't think about your servers day to day. And that's a good thing. That means they're working, keeping you...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  6 Min Read
                              
                              8 Traits of a Proactive Cybersecurity Strategy
                                  The goal of a strong cybersecurity strategy is to reduce cyber risks and then further to prevent them from being exploit...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  4 Min Read
                              
                              Should an MSP Handle All Your Cybersecurity Needs?
                                  Should you use your MSP to address your cybersecurity needs vs. using a dedicated Managed Security Service Provider (MSS...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  4 Min Read
                              
                              Getting an IT Support Quote: What Does An IT Outsourcing Quote Involve?
                                  There are many different ways that IT support providers quote their services and several factors that go into providing ...
                              
                              
                              Read More