Jeffery Lauria

Recent Posts

December 17, 2024

The 12 Days of Scams: A Holiday Cybersecurity Carol

IT Trends, Cybersecurity

December 10, 2024

Crack the Code on QR Code Hacking

Cybersecurity

November 21, 2024

What the Mike Tyson Fight Taught Us About Netflix, AWS, and National Security

Cloud Computing

November 5, 2024

Understanding IT Consulting, IT Services, vCISO, and more heading into 2025

IT Outsourcing, Managed IT Services

September 10, 2024

The Growing Threat of Data Breaches

Cybersecurity

September 3, 2024

The National Public Data Breach: Business, Employee and Service Provider Responsibilities

Cybersecurity

August 6, 2024

Maximizing MSSP Value: Beyond Automated Testing and Raw Data

Cybersecurity

July 30, 2024

Web Browsers and Data Privacy: Balancing Enterprise and Personal Use

Cybersecurity

July 29, 2024

It's Time to Rethink Automatic Updates

Cybersecurity

July 16, 2024

You're Responsible for That Data Breach on Microsoft 365: Here's How to Prevent It

Cybersecurity

June 18, 2024

Understanding DNSSEC: A Key to Online Security for Businesses

Cybersecurity

June 12, 2024

4 Tips for Preventing Data Breaches

Cybersecurity

June 4, 2024

MFA Tips to Combat Authentication Fatigue

Cybersecurity

May 21, 2024

How Frameworks Protect Your Business: A Guide to Cybersecurity Standards

Cybersecurity

May 14, 2024

A Crucial Cybersecurity Tip: Protect Your MFA Code

Cybersecurity

May 7, 2024

Protect Yourself from SMS Scams: Understanding and Defending Against Smishing

Cybersecurity

April 30, 2024

Why Using Your Business Email Address on Personal Websites is a Cybersecurity Risk

Data Privacy, Cybersecurity

April 16, 2024

What Is the Difference Between a vCISO And a Virtual CIO?

IT Outsourcing, Cybersecurity

April 9, 2024

DNS Unleashed - Boosting Your Online Experience

Data Privacy, Cybersecurity

April 2, 2024

Rethinking VPNs at the Edge: Why Proxy Services Offer a More Secure and Usable Solution

Data Privacy, Cybersecurity

March 5, 2024

Surviving a Wireless Network Outage: A Guide for SMBs

Business Continuity + Disaster Recovery

February 20, 2024

5 Business Benefits of Staff Augmentation

IT Outsourcing

January 23, 2024

5 Ways Azure is Shaping SMB Success in 2024

Microsoft 365, Digital Transformation

January 16, 2024

Evolution of Ransomware: How Threat Actors are Using Regulatory Compliance Against Businesses

IT Governance + Compliance, Cybersecurity

January 9, 2024

Understanding the Risks and Legalities of Decentralized VPNs in Cybersecurity

IT Governance + Compliance, Cybersecurity

November 28, 2023

7 Ways to Protect Your Business from Point-of-Sale Hacks

November 21, 2023

Cybersecurity Best Practices for Your Business

Managed IT Services

November 14, 2023

The True Benefits of Outsourcing Your IT

Managed IT Services

October 3, 2023

CMMC Level 1 for SMBs

Cybersecurity

September 19, 2023

How Small Businesses Can Benefit from AI

IT Trends

September 5, 2023

iCorps' Cybersecurity Insights Meet the Boston Business Journal

IT Trends, News and Events, Cybersecurity

August 29, 2023

iCorps' Cybersecurity Insights Coming Soon to the Boston Business Journal

IT Trends, News and Events

August 22, 2023

Cyber Incident Detection & Response - No Longer a "Nice to Have" for Public Companies

Cybersecurity

August 1, 2023

MDR: Why Not All Vendors Are the Same

IT Outsourcing, Cybersecurity

July 25, 2023

How to Build a Defendable Cyber Security Program for Your Business

Cybersecurity

July 11, 2023

Securing Your Business: Why a vCISO is a Must-Have in Today's Digital Landscape

IT Outsourcing, Cybersecurity

July 3, 2023

SMS Authentication Phase Out: Why MFA is Best

IT Outsourcing, Cybersecurity

June 27, 2023

CMMC Prep: How to Benefit from an MSP or MSSP

IT Outsourcing, Construction + Manufacturing IT Services

June 20, 2023

What is CMMC?

IT Outsourcing, Construction + Manufacturing IT Services

June 13, 2023

What WCAG and ADA Compliance Mean for Your Business Website

IT Outsourcing

June 6, 2023

Email Security for Your Business: SPF, DKIM, DMARC Explained

Email Security + Encryption

May 9, 2023

Microsoft 365 GoDaddy Defederation Explained

IT Outsourcing

April 26, 2023

Kaseya Connect Global Panelist - iCorps' Jeffery Lauria

IT Trends

April 18, 2023

What is the Difference Between an MSP and MSSP?

IT Trends

April 4, 2023

What is a Managed Service Provider (MSP)?

IT Outsourcing, Managed IT Services

March 13, 2023

How a Third-Party Data Breach Can Affect You and Your Business

Cybersecurity

March 7, 2023

Managing Use of Single-Sign-On (SSO) or a Password Manager if SSO isn’t Available

Mobile Device Management, Cybersecurity

February 27, 2023

8 Cybersecurity Tips for Business Travel

Mobile Device Management, Cybersecurity

November 15, 2022

What Actually Happens During a Ransomware Attack? Here's A Step by Step Look

Cybersecurity

November 8, 2022

How to Get Started with the NIST Cybersecurity Framework

Cybersecurity

November 1, 2022

Five Cloud Security Best Practices Every Business Should Follow

Cybersecurity

October 25, 2022

How to Report Cyber Scams to the FBI’s Internet Crime Complaint Center (IC3)

Cybersecurity

October 18, 2022

3 Business Benefits of a Digital Rights Management (DRM) Solution

Cybersecurity

October 11, 2022

Security Operations Center (SOC-as-a-Service) Benefits by Industry

Cybersecurity

September 27, 2022

How to Secure Your Business Endpoints with Microsoft Sentinel

Cybersecurity

August 23, 2022

MDR vs. SOAR vs. SOC—How to Choose an Effective Cybersecurity Solution

Cybersecurity

August 9, 2022

Does Your Business Need a Security Operations Center (SOCaaS)?

Cybersecurity

August 2, 2022

How to Secure Your Company's Legacy Applications

Cybersecurity

July 5, 2021

5 Questions to Ask Before Buying a Cyber Insurance Policy

IT Governance + Compliance, Cybersecurity

April 13, 2021

What Are Data Breach Safe Harbor Laws? Top Security Benefits for SMBs

IT Governance + Compliance

March 23, 2021

Why IT Governance Is Critical for Cybersecurity & Data Privacy Success

IT Governance + Compliance

October 21, 2019

What You Need to Know About DNS Firewall Security

Network Monitoring + Security, Cybersecurity

October 15, 2019

5 Ways to Protect Your Company from Digital Sprawl

IT Governance + Compliance, Cybersecurity

September 5, 2019

The Pros and Cons of Single-Sign-On Identity Management

Microsoft 365, Cybersecurity

August 29, 2019

AI: The Biggest Threat to Privacy

Mobile Device Management, Cybersecurity

September 16, 2016

How the Cloud Complements IT as a Service (ITaaS)

Cloud Computing