Filter by

Blog
|
3 Min Read
Continuous Cybersecurity Monitoring vs Penetration Testing for FTC Safeguar...
3 reasons why you’ll want continuous monitoring (vs. penetration testing alone) as your primary method of meeting the FT...
Read More

Blog
|
10 Min Read
The Evolution of Artificial Intelligence in Cybersecurity
In the ever-evolving landscape of technology, few fields have garnered as much attention and intrigue as Artificial Inte...
Read More

Blog
|
3 Min Read
3 Unexpected Ways the Updated FTC Safeguards Rule Will Trip Up CPA Firms
The updated FTC Safeguards Rule now includes specific requirements that a CPA firm’s information security plan must con...
Read More

Blog
|
4 min read
IT Spending Benchmarks: Too Much, Too Little, Or Just Right
Some organizations overspend and get frustrated by a lack of return. Others sink into technical debt by underspending an...
Read More

Blog
|
5 Min Read
10 Cloud Backup and Archiving Myths
Businesses want to protect their sensitive data, but some treat backup and archiving as an afterthought. Here are 10 myt...
Read More

Case Studies
|
Case Study - Miller McDonald, Inc
CPA firm had no backups in place. VC3 implemented backups for the client and helped them avoid costly downtime when a se...
Read More