October 24, 2024 | 4 min. read

What You Should Know About Windows 10’s End of Life


Windows 10 is a bit of a yay-boo for Microsoft. It was amazingly popular after Windows 8 was… not. (Yay!) But it remains so amazingly popular that people don’t want to make the move to Windows 11....

Glenn Sweeney

Glenn Sweeney

Glenn Sweeney is a Senior Virtual CxO at Marco.
December 20, 2024 | 4 min. read

The Top Security Threats for SMBs


Many smaller organizations don’t consider themselves to be a target of cybercriminals. The “we’re too small to be w…

December 2, 2024 | 4 min. read

Email Retention Policy Best Practices


Does your business need an email retention policy? If you’re in finance, healthcare, government, or any other heavi…

November 4, 2024 | 6 min. read

What Is Social Engineering, and How Is It Used in Cybersecurity Attacks?


Social engineering sounds nice, and in some contexts, it is. Social engineering can mean shaping the development an…

June 7, 2024 | 3 min. read

Why Multi-Factor Authentication Is Important for Businesses


Passwords are a lot like keys. Some keys are better and more sophisticated than others, and a locked door is obviou…

March 29, 2024 | 3 min. read

What's the "Swatting" Tactic?


First off, swatting isn’t anything new, and it has nothing to do with bugs of any kind, let alone the computer vari…

February 1, 2024 | 5 min. read

What Is Data Governance and Why Is It Important?


The Data Governance Institute defines data governance as “a system of decision rights and accountabilities for info…

Previous Next