By: Marco
December 8, 2023 | 4 min. read

What You Really Need To Know About Data Backup Solutions


Do you feel lucky? If your business is located in the U.S., you should. In 2022, the incident rate for ransomware attacks in the US is just 7% compared to the worldwide average of 37%.

June 12, 2024 | 6 min. read

Business Fraud Prevention: 101


Nowadays, business fraud is a big business. According to Alloy’s 2024 State of Fraud Benchmark Report, 56% of surve…

June 7, 2024 | 3 min. read

Why Multi-Factor Authentication Is Important for Businesses


Passwords are a lot like keys. Some keys are better and more sophisticated than others, and a locked door is obviou…

May 24, 2024 | 4 min. read

What Are Honeypots and Honeytokens in Cybersecurity?


Companies these days are setting up multiple levels of defense in their cybersecurity programs, from advanced firew…

By  Marco
May 10, 2024 | 2 min. read

Meet the Marco Technology Assessment


Yes. We know — most “technology assessments” are very different. Ours isn’t just a simple scan, where we spit out a…

April 17, 2024 | 6 min. read

How To Conduct a Security Tabletop Exercise


Companies facing the daunting task of containing and recovering from a disaster are often caught off guard by the m…

By  Marco
April 4, 2024 | 3 min. read

What Is a SOC in Business and Why Do You Need One?


SOC stands for more than one thing in our industry, so it’s no wonder that we get a lot of questions about it at Ma…

April 2, 2024 | 4 min. read

CrowdStrike's 2024 Global Threat Report: Safeguarding Your Digital Assets in a Cloud-First World


In the ever-changing landscape of cybersecurity threats, it's vital that executives understand how to safeguard the…

March 29, 2024 | 3 min. read

What's the "Swatting" Tactic?


First off, swatting isn’t anything new, and it has nothing to do with bugs of any kind, let alone the computer vari…

February 22, 2024 | 2 min. read

What You Should Know About the Mother of All Breaches, 2024


The world of cybersecurity is always changing; new vulnerabilities and threat actors seem to pop up overnight — wel…