
What is the Log4j Vulnerability?
You may have heard recent tech news regarding the Log4j vulnerability and be curious how it might affect your business or organization. Please read on

You may have heard recent tech news regarding the Log4j vulnerability and be curious how it might affect your business or organization. Please read on

As we remembered the surprise attack on Pearl Harbor in 1941 this week, I thought it might be appropriate to look at veterans in I.T.

As we talked about in our blog regarding Black Friday Scams, the holiday season is full of opportunities. Most holiday opportunities are joyful and good,

As we approach the biggest shopping season of the year, please take a moment to remind your staff, employees, and co-workers of the possibility of

There are many pitfalls that can present security risks to companies that employ employ work from home (WFH) staff. A personal machine that is unmonitored

An interesting article was published this week in the tech news site Dark Reading, contributed by Connectwise Threat Researcher Bryson Medlock, that examines the relationship

The art of deepfake is one that has become increasingly nuanced in recent years. Wikipedia describes the process as “synthetic media in which a person

Why do we recommend SonicWALL firewalls for the best protection for small business? Please allow me to explain. The IT infrastructure is something of an

This week, major digital entertainment mogul Twitch suffered a massive data leak. In it, the source code of the project and the earnings of many

The issued CISA guidance for IT Managed Services Providers has some salient points, some impractical solutions, and others that live somewhere in-between. We’d like to
Disclaimer: Certified CIO is not an insurance company or licensed insurance broker. We provide IT services, cybersecurity assessments, and vendor introductions. All insurance policies are issued by third-party providers.