Encryption refers to the process of coding information with the goal of making it inaccessible or...
Todd A. Long
All Posts
Cybersecurity
Business Technology
Managed Services
Compliance
Newsletters
NCAM: Business Cybersecurity
Happy National Cybersecurity Awareness Month! I’ll be talking this week about security practices...
Protective Measures Against Ransomware (Part II)
Let’s talk about a few more security measures that will help defend your business against...
What Damage can Ransomware Do?
Ransomware attacks cost businesses and consumers an average of $1.85 million in recovery per...
What is Ransomware?
Ransomware is a big deal. In today’s technology-driven world, your data is extremely valuable, not...
Network Security: How it All Works Together
Over the last 3 weeks, we’ve talked individually about firewalls, network segmentation, antivirus...
Network Segmentation
Network segmentation is a vital part of cybersecurity, but what exactly is it? In short, it’s...
What is the Cloud?
Last week, Sterling talked about servers and how they function. This week, we’re going to talk...
Interview, re: SII Anniversary Part 2
Q: Tell us a little bit about how you met Charles and what your friendship was like at the very...
Sign Up for Our Newsletter
Our newsletters keep you up-to-date on the world of technology. We keep you informed on current technology, compliance news, and how to improve your business with tech. Sign up below to receive them, free of charge or obligation.