sikich logo
  • Services
    • Services
    • Technology Solutions
      • Technology Solutions
      • HEADSTART℠ Implementations
      • Modern Workplace
      • ERP Services
      • CRM Services
      • Cybersecurity
      • IT and Security Managed Services
      • Cloud Services
      • Digital Transformation
      • CRM and ERP Products
      • Spend Management
    • Accounting, Audit, Tax & Consulting
      • Accounting, Audit, Tax & Consulting
      • Outsourced Accounting
      • Audit & Assurance
      • Tax
      • Consulting Services
    • Advisory
      • Advisory
      • Business Succession Plan
      • Business Transformation
      • Forensic & Valuation
      • Human Capital Management & Payroll
      • Insurance Services
      • Regulatory, Quality & Compliance
      • Site Selection & Incentives
      • Transaction Advisory
      • Wealth Management
      • Investment Banking
      • Supply Chain
      • Marketing & Communications
      • Retirement Plan Services
      • Governance, Risk and Compliance Services
      • Workforce Risk Management
  • Industries
    • Industries
        • Manufacturing
          • Discrete Manufacturing
          • Industrial Equipment Manufacturing
          • Manufacturing
        • Life Sciences
        • Agriculture
        • Government Contractors
        • Financial Services
        • Construction & Real Estate
        • Not-For-Profit
        • Government
          • Federal Government
          • State & Local Government
          • Government
        • Distribution & Supply Chain
        • Professional Services
        • Title IV Audit & Consulting
  • Insights
    • Insights
    • COVID-19 Resources
    • Blog & Resources
    • News
    • Events
    • Lessons From Leadership
  • About
    • About
    • Our Company
    • Our People
    • Locations
    • Awards
    • Partnerships
  • Careers
  • Contact

Security

View All Sikich Insights
Using Endpoint Manager to Manage PCs Both Remote and Onsite

Using Microsoft Endpoint Manager to Manage PCs for Remote, On-Site, and Hybrid Workforces

Reading Time: 13 minutes
  • September 28, 2022
  • Information Technology | Security | Technology
Many organizations’ IT environments today are mixed. They use a cloud attached approach, meaning they use a combination of both cloud and on-premises technologies…
Read More
data logs in a cyber security breach

Why Your Logs (Probably) Won’t Help You During a Cyber Breach

Reading Time: 6 minutes
  • August 17, 2022
  • Security | Technology
Sikich’s digital forensics and incident response team investigates a variety of different breach situations, including those involving ransomware events, ecommerce site compromises, account takeovers…
Read More
sharepoint permissions and security

SharePoint Permissions – Should I Use Edit or Contribute for Members?

Reading Time: 3 minutes
  • August 16, 2022
  • Information Technology | Security | SharePoint | Technology
Microsoft SharePoint has been around for decades, and its security permissions haven’t changed a lot over the years. Permissions can be set at the…
Read More

How to Backup and Restore Environments in Dynamics 365

Reading Time: 3 minutes
  • August 5, 2022
  • Dynamics 365 | Information Technology | Security | Technology
Securing your data and ensuring continuous availability of service in customer engagement apps (Dynamics 365 Sales, Dynamics 365 Customer Service, Dynamics 365 Field Service,…
Read More
how to enable MFA for SonicWall firewall

How to Enable MFA for Your SonicWall Firewall

Reading Time: 3 minutes
  • July 5, 2022
  • Information Technology | Security | Technology
I have illustrated time and time again that MFA should no longer be considered a nice to have but a requirement when securing cloud…
Read More
Dynamics GP updates

Dynamics GP Updates Required for Functionality and Security

Reading Time: 2 minutes
  • July 1, 2022
  • Dynamics GP | Security | Technology
Any organization still using Dynamics GP, please be aware that Microsoft has released two updates. These two updates are required to ensure system functionality…
Read More
best security practices with a Managed Security Services Provider

Best Security Practices With Managed Security Services Providers

Reading Time: 8 minutes
  • June 17, 2022
  • Security | Technology
For business owners, business growth is the name of the game. It’s important to establish protocols that can easily grow with your business to…
Read More

Reviewing and Defending Against the Latest Cybersecurity Attacks in Manufacturing

Reading Time: 1 minute
  • May 3, 2022
  • Manufacturing | Security | Technology | Videos
https://youtu.be/YordiNyb9I8 Reviewing and Defending Against the Latest Cybersecurity Attacks in Manufacturing May 3, 2022 Learn more from Sikich on the latest in cybersecurity risks,…
Read More
prepping to transition to PCI DSS v4.0

Prepping Your Organization for PCI DSS v4.0

Reading Time: 3 minutes
  • April 28, 2022
  • Security | Technology
The Payment Card Industry Security Standards Council (PCI SSC) has made public version 4.0 of the PCI Data Security Standard(PCI DSS). As part of…
Read More
state-sponsored cyber security risks

Understanding and Addressing Current Cybersecurity Risks

Reading Time: 5 minutes
  • April 27, 2022
  • Security | Technology
State-sponsored cybercrime is an urgent concern in the world’s current situation. Cyber threats and attacks continue to become more sophisticated and consequential. How can…
Read More
MSSP cybersecurity

Why Should Your Business Team Up With a Managed Security Services Provider?

Reading Time: 8 minutes
  • March 1, 2022
  • Managed Services | Security | Technology
Today, practically every business generates data and depends on technology to serve customers and manage its operations. That also means that potentially every business…
Read More
cybersecurity

Cybersecurity Awareness Videos

Reading Time: 2 minutes
  • February 2, 2022
  • Security | Technology | Videos
Cybersecurity has constantly been one of the hottest topics in business and the countless stories in the news about hacked systems are just part…
Read More
how to use external websites in NetSuite

Do You Have an Award Winning NetSuite Partner in Your Corner?

Reading Time: 3 minutes
  • January 26, 2022
  • ERP | Security | Technology
Frustrated with lackluster support? Current partner MIA? Sikich, a 5-Star NetSuite Partner, can have your back. …
Read More
Cybersecurity

Solve 90% of ERP Security Threats by Making 1 Change

Reading Time: 2 minutes
  • January 26, 2022
  • ERP | Security | Technology
We have entered an era where visibility, flexibility, and being able to intelligently make decisions based upon trusted data and real-time data are necessary….
Read More
Managed Services Trends

3 Key Trends in Managed Services

Reading Time: 7 minutes
  • January 4, 2022
  • Information Technology | Managed Services | Security | Technology
Clients look to their IT managed services providers (MSP) to help them make the most productive use of technology and take advantage of innovations…
Read More
Log4 vulnerabilities

How to Detect and Protect Against Log4j Vulnerabilities

Reading Time: 3 minutes
  • December 16, 2021
  • Security | Technology
Apache Log4j (Log4j) is a popular open source Apache logging platform. However, the Log4j logger is not exclusively used in Apache web servers and…
Read More
SMB MSSP

Why Should Your Small-to-Mid-Sized Business Consider a Managed Security Service Provider (MSSP)?

Reading Time: 6 minutes
  • November 17, 2021
  • Managed Services | Security | Technology
Many of the crimes that occur in real life are now facilitated through the internet, and there’s a wide variety of them. Things like…
Read More
enterprise risks data normalization

Prioritizing Enterprise Risks Using Data Normalization

Reading Time: 4 minutes
  • November 5, 2021
  • Security | Technology
Data normalization is taking two to three data sets, whether they’re in databases or reports, and combining those data sets into one streamline database….
Read More
e-commerce website security

E-commerce Website Security: How to Prevent Card Breaches

Reading Time: 4 minutes
  • October 29, 2021
  • Security | Technology
If you’re a merchant with an e-commerce website, you undoubtedly accept credit and debit cards as payment. You may, like many online merchants, use…
Read More
global supply chain cybersecurity

Protecting Global Supply Chain Businesses From Nobelium and Other Cybersecurity Attackers

Reading Time: 4 minutes
  • October 27, 2021
  • Security | Technology
Attackers continue to be increasingly efficient at selecting industries to target for maximum impact. Similar to how a technology vendor or other company may…
Read More
« Previous Page1 Page2 Page3 Page4 … Page9 Next »

Accounting, Audit, Tax & Consulting

  • Outsourced Accounting
  • Audit
  • Tax
  • Consulting

Technology

  • Products
  • ERP & CRM Services
  • Business Intelligence
  • Office 365
  • Cloud & Infrastructure
  • Security & Compliance

Advisory

  • Business Succession Planning
  • Forensic & Valuation
  • Human Capital Management
  • Marketing & Communications
  • Retirement Plan Services
  • Investment Banking
  • Supply Chain
  • Insurance
  • Wealth Management
  • Transaction Advisory Services
  • Site Selection and Incentives
  • Regulatory, Quality & Compliance
  • Corporate Governance, Risk and Compliance
  • Workforce Risk Management

Company

  • About Sikich LLP
  • Corporate Development
  • Locations
  • Partners
  • Careers
  • News
  • Events
  • Blog
  • Client Login
  • Make a Payment

Connect With Us

Facebook-f Twitter Youtube Linkedin-in

©2023 All Rights Reserved.   Privacy Policy   Disclaimer

white sikich logo

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in settings.

Sikich LLP
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.