Webinars

Categories
Webinars Cybersecurity - Detection and Response Cybersecurity - Prevention Data Protection

Cybersecurity & Compliance: Managing Risks and Keeping IT Secure
ON-DEMAND WEBINAR

Critical pieces of information created and stored by businesses must be protected. Data protection may be a legal requirement, but it’s also essential for your organization’s security.

As more technology is being used in business operations and more data is being created and stored, higher levels of regulation are required to protect personal information. IT compliance aims to hold companies accountable, and cybersecurity helps keep data secure.

Join us for a discussion as we break down regulatory compliance and effective measures to protect IT systems.

What You’ll Learn:

  • Quick overview of compliance and regulation laws that may affect your business
  • Keeping your organization on top of regulatory compliance
  • Best practices for data protection
  • The cybersecurity basics checklist

Related Links Mentioned:

  1. What is the Principle of Least Privilege?
  2. CREO’s website
  3. What is multi-factor authentication?
  4. Importance of testing your backups

Meet Our Guest:

Rett Summerville, Director at CREORett Summerville, Director at CREO

With over 17 years of experience working in technical and business roles in software, fintech, and consulting services, Rett is a seasoned IT security and risk management leader.

He promotes business-driven security and believes that good IT security practices can help companies be more competitive by enabling them to make better decisions quickly and confidently.

His passion for helping clients allows them to transform their culture to improve security awareness, gain efficiencies, and maintain compliance.

In this webinar, Rett joins us to share his wealth of knowledge on regulatory compliance and best practices for businesses as they navigate through the requirements.

Categories
Webinars Data Protection Productivity Cybersecurity - Prevention

Head in the Cloud? What You Need to Know About Cloud Technology
ON-DEMAND WEBINAR

It’s no surprise that many businesses are making the move towards a cloud environment, especially given the flexibility and scalability that it allows. However, it can seem overwhelming to know where to start when it comes to making the switch.

How can small businesses continue to be competitive by shifting towards the cloud, while also staying productive and secure?

Join us for a discussion as we break down the cloud with things to consider as you make the switch.

In this webinar, we’ll focus on strategies to help your organization better understand the options so you can adopt the right cloud technologies. With 20 years of experience working with small businesses, we’ll answer the most common questions, including:

  • Should we move our server to the cloud?
  • How do we keep secure in the cloud?
  • What does the migration to the cloud look like?

Segments
  1. Cloud Technology (starts at 1:52)
  2. Cloud Security (starts at 13:45)
  3. Cloud Migration (starts at 22:17)

Related Links Mentioned:

Marissa Explains IT All: What is the cloud?

Webinar: Sharing Files in the Cloud

Marissa Explains IT All: What is multi-factor authentication?

Blog: Easy Tips to Strengthen Password Security

Marissa Explains IT All: What is the Principle of Least Privilege?

Blog: How DNS Security Keeps Your Organization Secure

Blog: Tips for Testing Your Backups

Marissa Explains IT All: How to Choose the Right Firewall

Level up webinar series

Categories
Data Protection Cybersecurity - Prevention

Marissa Explains IT All: How to Choose the Right Firewall

When it comes to selecting the right firewall for your business, there’s a few considerations to think about. Your firewall is an integral part of keeping your business secure, so you want to ensure that you have the proper one in place to do just that.

In today’s hybrid work environment, nearly everything is connected to the internet in order to allow this flexible work style. Unfortunately, if it’s connected to the internet, it’s also at risk for cyberattack.

Categories
Cybersecurity - Prevention Blog

How to Protect Your Organization’s Email from Cyberattacks

Email is one of the most used methods of collaboration in the workplace. Unfortunately, it’s also become one of the most popular methods for cyberattack. From phishing emails to emails with malicious attachments, email can be as vulnerable as it is essential.

That’s why teaching your employees good security habits is incredibly helpful in protecting against email-based threats. They learn how to spot potential threats, but with how much we rely on email, more can be more when it comes to cybersecurity.

Categories
Cybersecurity - Prevention Blog

Marissa Explains IT All: What is multi-factor authentication?

It’s no secret that securing all of your different accounts is crucial to keeping your data protected. Multi-factor authentication helps to provide an extra layer of security by requiring users to identify themselves using more than just a username and password.

How does it work? Check out Marissa’s 60-second explanation of multi-factor authentication below!

Categories
Cybersecurity - Prevention Blog

Benefits of Using Single Sign-On and Why It’s Important for Your Business

The use of the cloud is growing with software-as-a-service making it easy for small businesses to adopt technology without managing and maintaining any infrastructure. Plus, in the ever-changing hybrid workplace, cloud apps give your team access to what they need from anywhere.   

Categories
Collaboration Tools Cybersecurity - Prevention Blog

How to Use OneDrive, SharePoint, and Teams for Secure File Storage & Sharing

With their focus on making it easier for people to work from anywhere, Microsoft 365 has several apps for secure file sharing and secure file storage.

Here’s our recommendation on how to use OneDrive, SharePoint, and Teams for secure file storage and sharing.

Categories
Employee-friendly Content Cybersecurity - Prevention Blog

Stay Phish Proof: Best Practices for Spotting Phishing Emails

With emails being such a common tool for communication, both in the business world and on a personal level, phishing emails are becoming more common as well.

Check out this short video (less than 10 minutes) for some of the quickest ways to spot a phishing email, and what to do if you receive one.

Categories
Employee-friendly Content Cybersecurity - Prevention Blog

Easy Tips to Strengthen Password Security

Strong passwords help prevent unauthorized access and potential data breaches. But what makes a password strong? Here are our top password tips to help you protect your data.

Categories
Webinars Hybrid Work Cybersecurity - Prevention Cybersecurity - Detection and Response

Prevention & Recovery: IT Security in the Hybrid Workplace
ON-DEMAND WEBINAR

As many employees continue to work remotely and split time between working in the office and home, the focus on the cloud is growing. Technology like Microsoft 365 helps small businesses remain competitive in the hybrid workplace.

While it helps your team achieve results and stay connected when working from anywhere, the flexibility of the cloud creates security risks. Making sure your cybersecurity strategy shifts with the way you work is important in keeping your organization safe from cyber threats.

Prevention & Recovery: IT Security in the Hybrid WorkPlace

That’s why we’re focusing this 1-hour discussion on prevention & recovery. More specifically, we’re talking about preventing cyber attacks with Microsoft 365 security tools and investing in cyber insurance as a way to recover from one.

What you’ll learn

  • How Microsoft 365 can help protect against phishing attacks
  • The risks of using passwords and how Microsoft 365 can help keep attackers out without making it harder for your employees to log in.
  • Why Azure AD and InTune may replace the domain controller in your office
  • How cyber insurance protects your organization and what may be excluded from your coverage
  • What impacts the cost of a cyber policy

Meet our guests

Rob Witteman, Project Lead at WorkSmart

Rob has worked for a total of 8 years in the MSP space, and has been with WorkSmart for 4 of those years. He currently serves as WorkSmart’s Onboarding Project Lead.

In this role, Rob focuses on new client onboarding projects to ensure a successful start to their partnership with WorkSmart.

As a Microsoft certified IT professional, Rob helps companies leverage Microsoft technologies and leads the team in training to keep everyone on pace with Microsoft’s evolving platform. He believes in using technology to make work easier and to make the tech experience as smooth as possible for everyone.

Ralph Whitehurst Jr, Business Development at Triangle Risk Advisors

As President/CEO of Total Retirement Planning and Whitehurst Strategic Partners, Ralph has transformed a successful hometown insurance agency into a regional leader for evolving businesses and family financial consulting, specializing in retirement planning, estate preservation, risk management, business and family consulting.

After merging his practice with Triangle Risk Advisors, LLC in 2019, Ralph continues his role, along with serving on numerous safety and advisory boards for both insurance companies and clients.

Ralph understands that every client’s needs are unique, therefore the firm uses proprietary processes to identify those needs and create a custom roadmap for each client.