Protecting Your Business from Within Importance of a Cybersecurity Strategy: In today’s digital age, the importance of a robust cybersecurity strategy cannot be overstated. Cyberattacks are increasing in frequency and sophistication, with 66% of businesses experiencing a cyberattack in the past 12 months1. This means that hackers can target businesses of all sizes. Developing a solid cybersecurity […]
Author Archives: Jordon Darling
What are other small and mid-sized businesses planning for 2024? 2024 is off and running. Many businesses have done their planning and budgeting to set their course to success in the coming year. Here are five technology and security trends small and medium businesses are preparing to leverage this year: 1. Information Security Fundamentals I am seeing […]
Artificial Intelligence (AI) has been all the media rage in the past year. Specifically, it isn’t AI in general, but a specific category of AI known as generative AI. This AI is capable of creating content, such as text, images, audio and similar data. Examples of generative AI tools can create content, music, image code, […]
Holidays are a time when cyber attacks spike. Criminals are hoping you are rushed, distracted, and they play into the things you are most likely to click on. Top Dog PC’s Jordon Darling gives his Top 4 Email Phishing Attacks you should watch out for this holiday season. This video will show you common phishing […]
We all know that passwords suck. This video is a quick guide on how to make better passwords without losing your mind. Top Dog PC’s Jordon Darling covers the following: 1. Why passwords suck 2. How to make them not suck 3. How to make them not suck even more This video will show you […]
A guide for businesses of all sizes to start your journey toward CMMC Certification. Since the announcement of the Cybersecurity Maturity Model Certification, which was developed due to the rising supply chain risks across the Defense Industrial Base (DIB), organizations of all sizes have been scrambling to figure out how it impacts them and what […]
Friday Night Bytes Podcast continues as Scott and Jordon set the table to discuss ransomware attacks and ransomware gangs Overview of Ransomware Overview of ransomware group Hive Vulnerabilities and more
As workers fled home to handle everything remotely, organizations had to quickly address new threats and questions that were raised about maintaining the integrity and safety of their data. From the IT perspective, the pandemic… What role can MSPs play? Managed service providers can make transitions smoother for businesses from the IT perspective even during […]
The debut of Scott Rysdahl and Jordon Darling’s new podcast Friday Night Bytes where they talk about Information Security AND… local eateries?… WHAT? What does Information Security and local dining have in common?… they both get discussed on this show. Episode 1 we start with Passwords. It’s the end of passwords as we know it […]
Ransomware vs. other malware attacks Organizations are familiar with the risks of malicious software. Viruses can corrupt data, and malware can be used to illegally access and exploit sensitive information for financial gain. Examples include the sale of credit card numbers, identity theft, and the sale of Social Security numbers. The sheer variety and quantity […]
- 1
- 2