sikich logo
  • Services
    • Services
    • Technology Solutions
      • Technology Solutions
      • HEADSTART℠ Implementations
      • Modern Workplace
      • ERP Services
      • CRM Services
      • Cybersecurity
      • IT and Security Managed Services
      • Cloud Services
      • Digital Transformation
      • CRM and ERP Products
      • Spend Management
    • Accounting, Audit, Tax & Consulting
      • Accounting, Audit, Tax & Consulting
      • Outsourced Accounting
      • Audit & Assurance
      • Tax
      • Consulting Services
    • Advisory
      • Advisory
      • Business Succession Plan
      • Forensic & Valuation
      • Insurance Services
      • Human Capital Management & Payroll
      • Wealth Management
      • Transaction Advisory
      • Site Selection & Incentives
      • Regulatory, Quality & Compliance
      • Investment Banking
      • Supply Chain
      • Marketing & Communications
      • Retirement Plan Services
      • Governance, Risk and Compliance Services
      • Workforce Risk Management
  • Industries
    • Industries
        • Manufacturing
          • Discrete Manufacturing
          • Industrial Equipment Manufacturing
          • Manufacturing
        • Life Sciences
        • Agriculture
        • Government Contractors
        • Financial Services
        • Construction & Real Estate
        • Not-For-Profit
        • Government
          • Federal Government
          • State & Local Government
          • Government
        • Distribution & Supply Chain
        • Professional Services
        • Title IV Audit & Consulting
  • Insights
    • Insights
    • COVID-19 Resources
    • Blog & Resources
    • News
    • Events
    • Lessons From Leadership
  • About
    • About
    • Our Company
    • Our People
    • Locations
    • Awards
    • Partnerships
  • Careers
  • Contact

Security

View All Sikich Insights
cybersecurity predictions 2023

Cybersecurity Predictions for 2023

Reading Time: 2 minutes
  • January 31, 2023
  • Security | Technology
With 2022 in the books, the Sikich Cybersecurity practice is looking toward what the new year has in store. Members of the team offered…
Read More
protect your business against ransomware

Ransomware: How to Protect Your Business From Attack

Reading Time: 7 minutes
  • January 25, 2023
  • Managed Services | Security | Technology
Ransomware is one of the most dangerous of all the malicious programs on the internet. The FBI describes ransomware as “a type of malicious…
Read More
distribution business 2023

5 Areas of Your Distribution Business to Re-examine in 2023

Reading Time: 6 minutes
  • January 10, 2023
  • Distribution | Dynamics 365 | Security | Technology
2022 had its share of challenges. Some distributors were well prepared, while others struggled to navigate the changing tides of the economy, supply-chain constraints…
Read More
security and compliance

Why You Need to Treat Security and Compliance Holistically

Reading Time: 4 minutes
  • December 13, 2022
  • Managed Services | Security | Technology
Just like chocolate and peanut butter, two foods that are arguably better together, compliance and security should ideally be intertwined for optimum outcomes. Every…
Read More
CMMC for DoD contractors

How Sikich’s STARS Program Assists DoD Contractors with CMMC Compliance Efforts

Reading Time: 6 minutes
  • December 6, 2022
  • Information Technology | Security | Technology
The Department of Defense (DoD) recently announced an update for its Cybersecurity Maturity Model Certification (CMMC) program, a program designed to make sure that…
Read More
how to create a cybersecurity plan

How to Create a Cybersecurity Plan for Your Business

Reading Time: 5 minutes
  • November 29, 2022
  • Security | Technology
As technologies advance, so too do cyber criminals. In a recent report, small business intelligence firm UpCity noted, “Cybercrime cost U.S. businesses more than…
Read More
home office cybersecurity

12 Ways to Defend Home Offices Against Cybersecurity Attacks

Reading Time: 8 minutes
  • November 7, 2022
  • Security | Technology
2020 sparked a dramatic shift in working styles, technology requirements, and general business operations. In a matter of weeks, employees were working from home,…
Read More
profit from cyber attacks

Top Ways Threat Actors Profit From Cyber Attacks

Reading Time: 4 minutes
  • October 27, 2022
  • Security | Technology
Today’s threat actors have numerous potential motivations for attacking systems and networks. Attackers may set out to destabilize economies, promote causes, infiltrate governments, or…
Read More
Cybersecurity Breakthrough Award Managed Service Provider of the Year

Sikich Named ‘Managed Security Service Provider of the Year’ in 2022 CyberSecurity Breakthrough Awards Program

Reading Time: 4 minutes
  • October 6, 2022
  • News | Press Releases | Security | Technology
CHICAGO — October 6, 2022 — Sikich today announced that it has been named the winner of the “Managed Security Service Provider of the Year”…
Read More
best cybersecurity business protection practices

October Is National Cybersecurity Awareness Month: Here Are 4 Ways to Protect Your Business

Reading Time: 6 minutes
  • October 1, 2022
  • Security | Technology
This October marks the 19th Cybersecurity Awareness Month, an occasion for governmental and private agencies to unite and promote cybersecurity best protection practices and…
Read More
Using Endpoint Manager to Manage PCs Both Remote and Onsite

Using Microsoft Endpoint Manager to Manage PCs for Remote, On-Site, and Hybrid Workforces

Reading Time: 13 minutes
  • September 28, 2022
  • Information Technology | Security | Technology
Many organizations’ IT environments today are mixed. They use a cloud attached approach, meaning they use a combination of both cloud and on-premises technologies…
Read More
data logs in a cyber security breach

Why Your Logs (Probably) Won’t Help You During a Cyber Breach

Reading Time: 6 minutes
  • August 17, 2022
  • Security | Technology
Sikich’s digital forensics and incident response team investigates a variety of different breach situations, including those involving ransomware events, ecommerce site compromises, account takeovers…
Read More
sharepoint permissions and security

SharePoint Permissions – Should I Use Edit or Contribute for Members?

Reading Time: 3 minutes
  • August 16, 2022
  • Information Technology | Security | SharePoint | Technology
Microsoft SharePoint has been around for decades, and its security permissions haven’t changed a lot over the years. Permissions can be set at the…
Read More

How to Backup and Restore Environments in Dynamics 365

Reading Time: 3 minutes
  • August 5, 2022
  • Dynamics 365 | Information Technology | Security | Technology
Securing your data and ensuring continuous availability of service in customer engagement apps (Dynamics 365 Sales, Dynamics 365 Customer Service, Dynamics 365 Field Service,…
Read More
how to enable MFA for SonicWall firewall

How to Enable MFA for Your SonicWall Firewall

Reading Time: 3 minutes
  • July 5, 2022
  • Information Technology | Security | Technology
I have illustrated time and time again that MFA should no longer be considered a nice to have but a requirement when securing cloud…
Read More
Dynamics GP updates

Dynamics GP Updates Required for Functionality and Security

Reading Time: 2 minutes
  • July 1, 2022
  • Dynamics GP | Security | Technology
Any organization still using Dynamics GP, please be aware that Microsoft has released two updates. These two updates are required to ensure system functionality…
Read More
best security practices with a Managed Security Services Provider

Best Security Practices With Managed Security Services Providers

Reading Time: 8 minutes
  • June 17, 2022
  • Security | Technology
For business owners, business growth is the name of the game. It’s important to establish protocols that can easily grow with your business to…
Read More

Reviewing and Defending Against the Latest Cybersecurity Attacks in Manufacturing

Reading Time: 1 minute
  • May 3, 2022
  • Manufacturing | Security | Technology | Videos
https://youtu.be/YordiNyb9I8 Reviewing and Defending Against the Latest Cybersecurity Attacks in Manufacturing May 3, 2022 Learn more from Sikich on the latest in cybersecurity risks,…
Read More
prepping to transition to PCI DSS v4.0

Prepping Your Organization for PCI DSS v4.0

Reading Time: 3 minutes
  • April 28, 2022
  • Security | Technology
The Payment Card Industry Security Standards Council (PCI SSC) has made public version 4.0 of the PCI Data Security Standard(PCI DSS). As part of…
Read More
state-sponsored cyber security risks

Understanding and Addressing Current Cybersecurity Risks

Reading Time: 5 minutes
  • April 27, 2022
  • Security | Technology
State-sponsored cybercrime is an urgent concern in the world’s current situation. Cyber threats and attacks continue to become more sophisticated and consequential. How can…
Read More
« Previous Page1 Page2 Page3 … Page9 Next »

Accounting, Audit, Tax & Consulting

  • Outsourced Accounting
  • Audit
  • Tax
  • Consulting

Technology

  • Products
  • ERP & CRM Services
  • Business Intelligence
  • Office 365
  • Cloud & Infrastructure
  • Security & Compliance

Advisory

  • Business Succession Planning
  • Forensic & Valuation
  • Human Capital Management
  • Marketing & Communications
  • Retirement Plan Services
  • Investment Banking
  • Supply Chain
  • Insurance
  • Wealth Management
  • Transaction Advisory Services
  • Site Selection and Incentives
  • Regulatory, Quality & Compliance
  • Corporate Governance, Risk and Compliance
  • Workforce Risk Management

Company

  • About Sikich LLP
  • Corporate Development
  • Locations
  • Partners
  • Careers
  • News
  • Events
  • Blog
  • Client Login
  • Make a Payment

Connect With Us

Facebook-f Twitter Youtube Linkedin-in

©2023 All Rights Reserved.   Privacy Policy   Disclaimer

white sikich logo

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in settings.

Sikich LLP
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.