Thought Leadership

New Year, New Enhancements for Multi-Factor Authentication

January 18, 2023

Third-party authentication apps, like Microsoft Authenticator, offer users a higher level of security than SMS or phone calls. But, as with all things cybersecurity-related,  the tools that protect us must continue to evolve to stay ahead of bad actors.  To bolster the security of push notifications, Microsoft announced new features to Authenticator’s two-factor authentication capabilities for mobile device users. Most notably among the updates, number matching and additi [...]

Does your cybersecurity defense need SIEM (Security Information and Event Management)

October 20, 2022

Bad actors are currently targeting small- to medium-sized businesses (SMBs) because they often find them less prepared to deal with a cyberattack. These organizations often take the position that “I’m too small to be a target.”  This false sense of security is precisely what makes them an attractive target. This mindset can cost your business both outright, in the case of a ransomware attack, and in downtime. In fact, according to IBM, the average cost of a data breach in [...]

There is Time for Listening to Your Body with Eliza Kingsford, Boulder, Colorado

October 6, 2022

What’s the best way to compete burnout? By letting your teams know it’s okay to be human. Eliza Kingsford, psychotherapist and author, says it comes down to leaders to create workplaces based in psychological safety. And for Eliza, the key to doing that lies in science. Eliza has devoted her life to helping others understand their nervous systems more deeply so they can properly listen to their bodies and interpret the signals they are constantly sending. Listen in to hear how to reco [...]

Managing Your Technology Through End-of-Life

August 31, 2022

As with all things related to technology, change and evolution are inevitable.  End of Life (EOL) is part of a typical technology lifecycle and means an application, platform, or hardware will no longer be supported by its manufacturer. No more patching or security, no more updated versions. Choosing to continue to use an application, platform, or hardware once it has reached its end of life can result in compliance issues, increased operational costs, and, as mentioned above, security [...]

Solving the Cyber Insurance Puzzle

August 17, 2022

Partnering with a technology consultant can help your organization end up with the best protection. Cyber liability insurance is still a new landscape. And it’s changing a lot.  Right now, Multi-Factor Authentication (MFA) is the big thing.  Insurers are requiring it for coverage.  However, word on the street is that they are going to start requiring Endpoint Detection and Response (EDR) and Security Information and Event Management (SIEM) protection as early as 2023 [...]

Cybersecurity Best Practices: Changing MFA Processes

May 3, 2022

Data breaches can be devastating to an organization. They can come out of nowhere and leave your organization completely exposed. With approximately 50% of small businesses experiencing a cyberattack every year, it is imperative that your organization keep up to date on cybersecurity best practices to protect itself. What is SMS Multi-Factor Authentication (MFA)? MFA (Multi-Factor Authentication) is one of the simplest and most effective ways to curb cyber attacks. Think of it as [...]

Endpoint Protection Evolution: improving your cybersecurity

February 7, 2022

The cybercrimes landscape has changed drastically over the last few years with bad actors getting far more aggressive.  Recent attacks have proven that no industry – hospitals, schools, manufacturers, government – is safe.  However, as cyberattacks have increased, so have advances in cybersecurity defenses.  EDR, or Endpoint Detection and Response technology, has had a significant impact in protecting organizations.  What is EDR and does your organization need [...]

Making an Impact with Microsoft Power Platform

November 30, 2021

Power Platform consists of four Microsoft applications: Power Apps, Power Automate, Power BI, and Power Virtual Agents. Launched in 2019, these four applications sit on top of and pull data from Common Data Service (CDS), Microsoft’s underlying data storage and management platform. Power Platform also can extract data from any number of external data sources, like third-party data platforms (i.e. Google Analytics, QuickBooks) or internally maintained databases (i.e. manually produced Excel fi [...]

There is time to make a difference with Keith Ives, Denver

October 28, 2021

Keith Ives is a humanitarian, empiricist, and leader with a passion for people and impact. His company, Causal Design, creates cultures of evidence and impact among those working to solve the world’s problems. Keith knows problems like poverty and hunger require more than just volunteerism, so he’s bringing an evidence-based approach to the issue, empowering his clients to do more effective work. How does he do it? By making Zero Excuses and translating academic research into practica [...]

Azure Virtual Desktop – Why Make the Switch

June 17, 2021

With the events of the past year still fresh in our minds, it is more important than ever to regard technology as an integral business partner rather than simply a tool. Not only that, it is evident the flexibility offered by technology plays an important role in the overall functionality of the business. Many organizations are struggling to find that perfect solution to bridge the gap between home and office work for their employees. It might be time to investigate Azure Virtual Desktop (AVD). [...]