This month, we’ll be going through a series of “Should Ask Questions” (SAQs). These are questions...
Blog
All Posts
Cybersecurity
Business Technology
Managed Services
Compliance
Newsletters
Interview, re: Target Hack (Part II)
Q: Can you speak to infrastructural security measures like network segmentation and how the actual...
Interview, re: Target Hack (Part I)
Q: Can you tell us what you remember about when the Target hack occurred? As an IT professional,...
Target Hack: What We Learned
Over the past two weeks, we’ve talked about 2013’s Target hack. If you haven’t read those blog...
Target Hack: The Problem with Loose Security
Last week, we talked about the infamous Target hack of 2013. If you haven’t read my previous blog...
Target Hack: What Happened?
In 2013, Target was the victim of a famous hacking incident. This month, we’re going to dive into...
Interview, re: Evolution of Technology
Q: This month, we’ve been focusing on the evolution of technology over time. What was the first...
Technology from President to President
On this coming Monday, we celebrate President’s Day! I thought it would be fun to look at how...
Applied Technology
Last week, Todd talked about the history of the computer, so this week, I thought we’d take a look...
Sign Up for Our Newsletter
Our newsletters keep you up-to-date on the world of technology. We keep you informed on current technology, compliance news, and how to improve your business with tech. Sign up below to receive them, free of charge or obligation.