February 14, 2024 | 5 min. read

6 Questions To Ask a Managed IT Provider


A managed IT provider can do a lot more than just provide IT services and support. Many providers have the capacity to serve as key strategic business partners, but unless you ask six key questions,...

Glenn Sweeney

Glenn Sweeney

Glenn Sweeney is a Senior Virtual CxO at Marco.
December 20, 2024 | 4 min. read

The Top Security Threats for SMBs


Many smaller organizations don’t consider themselves to be a target of cybercriminals. The “we’re too small to be w…

December 2, 2024 | 4 min. read

Email Retention Policy Best Practices


Does your business need an email retention policy? If you’re in finance, healthcare, government, or any other heavi…

November 4, 2024 | 6 min. read

What Is Social Engineering, and How Is It Used in Cybersecurity Attacks?


Social engineering sounds nice, and in some contexts, it is. Social engineering can mean shaping the development an…

June 7, 2024 | 3 min. read

Why Multi-Factor Authentication Is Important for Businesses


Passwords are a lot like keys. Some keys are better and more sophisticated than others, and a locked door is obviou…

March 29, 2024 | 3 min. read

What's the "Swatting" Tactic?


First off, swatting isn’t anything new, and it has nothing to do with bugs of any kind, let alone the computer vari…

February 1, 2024 | 5 min. read

What Is Data Governance and Why Is It Important?


The Data Governance Institute defines data governance as “a system of decision rights and accountabilities for info…

Previous Next