According to the Cybersecurity and Infrastructure Security Agency, cyber incidents have surged among small businesses that often don't have the resources to defend against the devastating attacks like ransomware. We...Read More
Most small business owners and employees I talk with don't feel like protecting their mobile phones is very important until I share how often bad actors capture information from their phones and use that data to...Read More
As many of you know, it's fiesta time here in San Antonio, so I thought I'd kick off today with a wine glass and some festive multicolor lights on the bottom. Many of you may not know it, but Fiesta originally...Read More
Coming to you from a distant deck at Marco Island, Florida, today. Cheers. I just spent the last week at the Kaseya Global Connect Conference getting updates on the current technology landscape from Fred Voccola, CEO...Read More
You'll probably notice that I toasted you with a wine chalice, and this hat is very similar to the one that Indiana Jones wears. Now, you might remember the statement that Indiana Jones made Don't bring a sword to a...Read More
Coming to you from a distant deck at Marco Island, Florida. Again, cheers. After I got here to Marco Island, I had the opportunity to be a contestant on Cybersecurity Jeopardy! With our host Miles Walker, whom many...Read More
The big question today is what is cybersecurity compliance? When researching this, I found a very formal definition saying that cybersecurity compliance is, at its core adhering to standards and regulatory...Read More
I'm excited to let everyone know that my book, the Compliance Formula, Successful Strategies of CMC Compliant Companies, had a very successful launch last Thursday and achieved Amazon number one best seller. I really...Read More
This week, we'll finish our brief overview of the cybersecurity frameworks. Five High level Functions. So far, we've briefly discussed the identify, protect, detect, and respond functions. The fifth high-level...Read More
Read the rest of his inspiring story on how TechSage Solutions became the business it is today.
The Compliance Formula simplifies complex compliance challenges, equipping businesses to achieve CMMC certification and protect against costly cyber threats. Written by top IT leaders, this book is essential for organizations seeking to win Department of Defense contracts, enhance security, and avoid the financial and legal risks of non-compliance.