Encryption refers to the process of coding information with the goal of making it inaccessible or...
Todd A. Long
All Posts
Cybersecurity
Business Technology
Managed Services
Compliance
Newsletters
NCAM: Business Cybersecurity
Happy National Cybersecurity Awareness Month! I’ll be talking this week about security practices...
Protective Measures Against Ransomware (Part II)
Let’s talk about a few more security measures that will help defend your business against...
What Damage can Ransomware Do?
Ransomware attacks cost businesses and consumers an average of $1.85 million in recovery per...
What is Ransomware?
Ransomware is a big deal. In today’s technology-driven world, your data is extremely valuable, not...
Network Security: How it All Works Together
Over the last 3 weeks, we’ve talked individually about firewalls, network segmentation, antivirus...
Network Segmentation
Network segmentation is a vital part of cybersecurity, but what exactly is it? In short, it’s...
What is the Cloud?
Last week, Sterling talked about servers and how they function. This week, we’re going to talk...
Interview, re: SII Anniversary Part 2
Q: Tell us a little bit about how you met Charles and what your friendship was like at the very...
Sign Up for Our Monthly Newsletter
Our monthly newsletters keep you up-to-date on the world of technology. Each month, we feature a letter from Charles, an article about current technology, and an introduction to one of our team members. Sign up below to receive them, free of charge or obligation, every month.