Jeffery Lauria

Recent Posts

November 15, 2022

What Actually Happens During a Ransomware Attack? Here's A Step by Step Look

Computer Security

November 8, 2022

How to Get Started with the NIST Cybersecurity Framework

Computer Security

November 1, 2022

Five Cloud Security Best Practices Every Business Should Follow

Computer Security

October 25, 2022

How to Report Cyber Scams to the FBI’s Internet Crime Complaint Center (IC3)

Computer Security

October 18, 2022

3 Business Benefits of a Digital Rights Management (DRM) Solution

Computer Security

October 11, 2022

Security Operations Center (SOC-as-a-Service) Benefits by Industry

Computer Security

September 27, 2022

How to Secure Your Business Endpoints with Microsoft Sentinel

Computer Security

August 23, 2022

MDR vs. SOAR vs. SOC—How to Choose an Effective Cybersecurity Solution

Computer Security

August 9, 2022

Does Your Business Need a Security Operations Center (SOCaaS)?

Computer Security

August 2, 2022

How to Secure Your Company's Legacy Applications

Computer Security

April 13, 2021

What Are Data Breach Safe Harbor Laws? Top Security Benefits for SMBs

IT Governance + Compliance

March 23, 2021

Why IT Governance Is Critical for Cybersecurity & Data Privacy Success

IT Governance + Compliance

October 21, 2019

What You Need to Know About DNS Firewall Security

Computer Security, Network Monitoring + Security

October 15, 2019

5 Ways to Protect Your Company from Digital Sprawl

Computer Security, IT Governance + Compliance

September 5, 2019

The Pros and Cons of Single-Sign-On Identity Management

Computer Security, Microsoft 365

August 29, 2019

AI: The Biggest Threat to Privacy

Computer Security, Mobile Device Management

September 16, 2016

How the Cloud Complements IT as a Service (ITaaS)

Cloud Computing