NIST – Achieving Alignment in Cybersecurity
Technology has always been a dynamic market. Traditional focus has moved from a hardware/software to virtualization and the cloud but data has clearly been designated as the true prize and in the unpatrolled world of the Internet, it is up to you to secure it. You can have the fastest car in the lot but…Read More
NIST – Protecting What’s Most Important
By James Laszko The National Institute of Standards and Technology (NIST) created the Cybersecurity Framework (CSF) to give businesses foundational structure and common language to address their own individual security needs. In our previous article NIST – Achieving Alignment in Cybersecurity we established that some form of cybersecurity posture is necessary to simply do business…Read More
We Welcome Our New Service Manager, Freddie Washington
Freddie will be responsible for service team leadership, driving growth and excellence in service delivery, as well as serving on the Mythos leadership team. Freddie has a passion for excellence and a demonstrated ability of developing and managing high performance teams. He is an accomplished executive, with 15 years’ experience in technology and is skilled…Read More
NIST Cybersecurity and Your Agency
Every business is a technology business. Every executive, manager and staff member needs to have a sense of data governance. Data is the thread that holds your business together. With that in mind, what will you do tomorrow that you would not have done today? In the following presentation, James Laszko will discuss the…Read More
NIST – Identifying What You Need to Protect
By James Laszko In my previous article NIST – Achieving Alignment in Cybersecurity we discussed how the National Institute of Standards and Technology (NIST) created the Cybersecurity Framework (CSF) to give businesses foundational structure and common language to address their own individual security needs. We established that some form of cybersecurity posture is necessary to…Read More
Mitigate Costly New Technology Risks for Continued Stability and Profitability
Partnering with a managed service provider (MSP) is one new approach being used by many companies like yours. Experienced MSPs have access to newer tools that reduce costs by automating many routine in-house labor intensive processes. Break-fix is labor intensive, and labor is one of the most expensive operating costs within your IT infrastructure. The…Read More
Disaster Recovery Plans: Do You Have One?
Disaster Recovery Plans: Do You Have One? Disaster recovery and business continuity plans are issues that almost all small businesses fail to think about. More frequently, they decide they haven’t the resources to address such “unthinkables.” If your business was down for 1-2 days or more, what costs would you incur? Lost revenues and lost…Read More
Is your Business Safe from Virtual Threats?
Did you know that 50% of small business owners think their businesses are too small to be targeted by the thieves of the virtual world? Contrary to popular belief, 72% of hacker attacks often happen to smaller firms – firms with less than 100 employees! So how prepared is your SMB? Here’s a checklist to…Read More
Social Engineering: More than Just Phishing
by Stefani Laszko You are probably tired of reading about email security with constant chatter about phishing attacks. I get it, I’ve written 3 other articles on the topic. This month I’d like to go a step further and discuss other ways that criminals gain you or your client’s information through different types of social…Read More
Why Small Businesses Shouldn’t Avoid Making Disaster Recovery Plans.
Why Small Businesses Shouldn’t Avoid Making Disaster Recovery Plans. Entrepreneurs and small businesses, especially ones that are fairly new, often don’t think about making plans to recover in case of a disaster. However, it is the smallest business that most likely has the fewest resources to fall back on in case of disaster. Why does…Read More