Kevin Howarth
Filter by
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  3 Min Read
                              
                              What Does It Mean To Be Compliant?
                                  Regardless of your organization’s size or the industry you are operating in, you need to comply with some regulatory sta...
                              
                              
                              Read More
                          
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  4 Min Read
                              
                              8 Ways to Protect Your Business From Ransomware
                                  These are 8 things that you should be doing in the day to day of running your IT that would reduce the probability of be...
                              
                              
                              Read More
                          
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  7 Min Read
                              
                              Ensuring CJIS Compliance: A Partnership Between You and IT
                                  Police chiefs and municipal leaders are ultimately accountable for CJIS compliance. This article breaks down responsibil...
                              
                              
                              Read More
                          
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  8 Min Read
                              
                              Bridging the Gap: Technology’s Role in Achieving Top Mayoral Priorities
                                  This blog post explores five mayoral priorities from the NLC report and demonstrates how IT and cybersecurity are the co...
                              
                              
                              Read More
                          
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  5 Min Read
                              
                              What Police Chiefs and Other Municipal Leaders May Not Realize About CJIS C...
                                  This blog is your CJIS briefing. In plain language, it highlights areas where municipal leaders may be underinformed and...
                              
                              
                              Read More
                          
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  5 min read
                              
                              The Biggest Hidden Red Flags in a Phishing Email
                                  During Cybersecurity Awareness Month, you'll likely hear a lot about the dangers of phishing emails. Many common red fla...
                              
                              
                              Read More