
Anatomy of a Man-In-The-Middle Attack
This month, Certified CIO’s resident security expert, Shaun Miller, presented the how and why—and how to prepare defenses against—a “man-in-the-middle” attack, which is essentially a

This month, Certified CIO’s resident security expert, Shaun Miller, presented the how and why—and how to prepare defenses against—a “man-in-the-middle” attack, which is essentially a

If you’ve ever wondered what our team of engineers is talking about when it comes to your IT networking, then it’s time for Networking 101. Read

Lest we forget the importance of business continuity when it comes to information systems: amid a wave of high-profile attacks over the last year, the

As cloud-based computing becomes more and more mainstream, Microsoft is getting further in on the action with Windows 365. This solution offers a PC-level cloud-based option which opens new options

As an IT Managed Services Provider, we keep tabs on cybersecurity threats as a primary function of our role. In that, we are noticing increased

On Friday, July 2—just in time for what would normally be a long holiday weekend—Kaseya experienced a major security event related to its remote monitoring

With the official Windows 11 announcement taking place on June 24, we’d like to provide an update to our previous post as some of the

Microsoft surprised many upon its Windows 10 retirement announcement and, in turn, all-but-announcing that a successor is being prepared for release. While one may wonder

The importance of IT consulting is often lost on small- and medium-sized business and organization decision makers. Why? Many times, unfortunately, simply due to ignorance

On May 12, 2021, President Biden issued an Executive Order outlining changes within the Executive Branch regarding cyberdefense standards. (You can read the entire text
Disclaimer: Certified CIO is not an insurance company or licensed insurance broker. We provide IT services, cybersecurity assessments, and vendor introductions. All insurance policies are issued by third-party providers.