Jeffery Lauria

Recent Posts

November 5, 2024

Understanding IT Consulting, IT Services, vCISO, and more heading into 2025

IT Outsourcing, Managed IT Services

September 10, 2024

The Growing Threat of Data Breaches

Cybersecurity

September 3, 2024

The National Public Data Breach: Business, Employee and Service Provider Responsibilities

Cybersecurity

August 6, 2024

Maximizing MSSP Value: Beyond Automated Testing and Raw Data

Cybersecurity

July 30, 2024

Web Browsers and Data Privacy: Balancing Enterprise and Personal Use

Cybersecurity

July 29, 2024

It's Time to Rethink Automatic Updates

Cybersecurity

July 16, 2024

You're Responsible for That Data Breach on Microsoft 365: Here's How to Prevent It

Cybersecurity

June 18, 2024

Understanding DNSSEC: A Key to Online Security for Businesses

Cybersecurity

June 12, 2024

4 Tips for Preventing Data Breaches

Cybersecurity

June 4, 2024

MFA Tips to Combat Authentication Fatigue

Cybersecurity

May 21, 2024

How Frameworks Protect Your Business: A Guide to Cybersecurity Standards

Cybersecurity

May 14, 2024

A Crucial Cybersecurity Tip: Protect Your MFA Code

Cybersecurity

May 7, 2024

Protect Yourself from SMS Scams: Understanding and Defending Against Smishing

Cybersecurity

April 30, 2024

Why Using Your Business Email Address on Personal Websites is a Cybersecurity Risk

Data Privacy, Cybersecurity

April 16, 2024

What Is the Difference Between a vCISO And a Virtual CIO?

IT Outsourcing, Cybersecurity

April 9, 2024

DNS Unleashed - Boosting Your Online Experience

Data Privacy, Cybersecurity

April 2, 2024

Rethinking VPNs at the Edge: Why Proxy Services Offer a More Secure and Usable Solution

Data Privacy, Cybersecurity

March 5, 2024

Surviving a Wireless Network Outage: A Guide for SMBs

Business Continuity + Disaster Recovery

February 20, 2024

5 Business Benefits of Staff Augmentation

IT Outsourcing

January 23, 2024

5 Ways Azure is Shaping SMB Success in 2024

Microsoft 365, Digital Transformation

January 16, 2024

Evolution of Ransomware: How Threat Actors are Using Regulatory Compliance Against Businesses

Computer Security, IT Governance + Compliance

January 9, 2024

Understanding the Risks and Legalities of Decentralized VPNs in Cybersecurity

Computer Security, IT Governance + Compliance

December 19, 2023

The 12 Days of Scams: A Holiday Cybersecurity Carol

IT Trends, Cybersecurity

November 28, 2023

7 Ways to Protect Your Business from Point-of-Sale Hacks

November 21, 2023

Cybersecurity Best Practices for Your Business

Managed IT Services

November 14, 2023

The True Benefits of Outsourcing Your IT

Managed IT Services

October 3, 2023

CMMC Level 1 for SMBs

Cybersecurity