sikich logo
  • Services
    • Services
    • Technology Solutions
      • Technology Solutions
      • HEADSTART℠ Implementations
      • Modern Workplace
      • ERP Services
      • CRM Services
      • Cybersecurity
      • IT and Security Managed Services
      • Cloud Services
      • Digital Transformation
      • CRM and ERP Products
      • Spend Management
    • Accounting, Audit, Tax & Consulting
      • Accounting, Audit, Tax & Consulting
      • Outsourced Accounting
      • Audit & Assurance
      • Tax
      • Consulting Services
    • Advisory
      • Advisory
      • Business Succession Plan
      • Forensic & Valuation
      • Insurance Services
      • Human Capital Management & Payroll
      • Wealth Management
      • Transaction Advisory
      • Site Selection & Incentives
      • Regulatory, Quality & Compliance
      • Investment Banking
      • Supply Chain
      • Marketing & Communications
      • Retirement Plan Services
      • Governance, Risk and Compliance Services
      • Workforce Risk Management
  • Industries
    • Industries
        • Manufacturing
          • Discrete Manufacturing
          • Industrial Equipment Manufacturing
          • Manufacturing
        • Life Sciences
        • Agriculture
        • Government Contractors
        • Financial Services
        • Construction & Real Estate
        • Not-For-Profit
        • Government
          • Federal Government
          • State & Local Government
          • Government
        • Distribution & Supply Chain
        • Professional Services
        • Title IV Audit & Consulting
  • Insights
    • Insights
    • COVID-19 Resources
    • Blog & Resources
    • News
    • Events
    • Lessons From Leadership
  • About
    • About
    • Our Company
    • Our People
    • Locations
    • Awards
    • Partnerships
  • Careers
  • Contact

Security

View All Sikich Insights
neural network security issues

AI, Neural Networks, and Deep Fakes

Reading Time: 5 minutes
  • November 22, 2019
  • Security | Technology
How do you know if the video you are watching is real? What about the news? With the improvements to artificial intelligence and neural…
Read More
detect SMB2 security level

Easy Wins for Active Directory – Part 2

Reading Time: 3 minutes
  • November 21, 2019
  • Information Technology | Security | Technology
In part 1 of this three-part series, we discussed detection methods and recommended fixes related to NetBios Name Service (NBNS) and Local-link Multicast Name…
Read More
bad link protection

Your Users Click Bad Links

Reading Time: 4 minutes
  • October 18, 2019
  • Security | Technology
Back in 2013, the IT industry started having “fun” with the newly released malware, Cryptolocker. Unlike previous malware programs or viruses, Cryptolocker took good…
Read More
mobile data security

Mobile Device Safety

Reading Time: 3 minutes
  • September 23, 2019
  • Security | Technology
These days people tend to rely on their mobile devices more than ever, and while everyone believes they need to protect their devices, many…
Read More
Managed Services security

Internal IT Threats and How Managed Services Comes to Mind

Reading Time: 4 minutes
  • September 20, 2019
  • Information Technology | Managed Services | Security | Technology
It is no secret that the world of technology today is always under threat for breaches, data exposure, or hacking. Where there is one…
Read More
Office 365 security

Office 365: Simple Setting Changes to Increase Security

Reading Time: 3 minutes
  • September 17, 2019
  • Office 365 | Security | Technology | Tips & Tricks
Recently, the U.S. Cybersecurity and Infrastructure Agency (CISA) published a report on their security observations on Office 365. In it, they detail some configuration…
Read More
hurricane dorian disaster recovery backups

Hurricane Dorian and Your Backups

Reading Time: 3 minutes
  • September 3, 2019
  • Information Technology | Security | Technology
This morning me and my dog, Picard, woke up early and walked out to the beach to see the sunrise. We’re on vacation here…
Read More
locked circuits with ERP cybersecurity protocols

Why Your Company Needs ERP Cybersecurity

Reading Time: 9 minutes
  • September 3, 2019
  • ERP | Infographic | Manufacturing | Security
Why you Need an ERP CYbersecurity Strategy Today’s powerful ERP systems are at the center of a company. That makes them the perfect, high-value…
Read More
does a firewall protect against malware

Security Doesn’t Stop at the Firewall

Reading Time: 5 minutes
  • August 22, 2019
  • Security | Technology
It is a common misconception that installing a firewall and having anti-virus on PCs and servers keeps businesses safe from malware, ransomware, and data…
Read More
how cyber attacks work

How Modern Attackers Target Your Environment

Reading Time: 5 minutes
  • August 15, 2019
  • Security | Technology
Network defense has traditionally focused on vulnerability management. However, as network and endpoint defenses improve, attackers increasingly target user credentials. When I first started…
Read More
How to Select Vulnerability Scanning Targets

Selecting Vulnerability Scanning Targets

Reading Time: 3 minutes
  • August 13, 2019
  • Information Technology | Security | Technology
Vulnerability scanning is an automated process that involves using various tools to: Look at which ports are open on a system; Investigate the service…
Read More
Network Tokenization

What is Network Tokenization?

Reading Time: 4 minutes
  • August 9, 2019
  • Information Technology | Security | Technology
Tokenization of payment card data has existed for almost 20 years, and the concept of replacing high-value information with low-value information has been in…
Read More
offsite disaster recovery

Need a Low-Cost Solution for Offsite Disaster Recovery?

Reading Time: 3 minutes
  • August 7, 2019
  • Azure | Security | Technology
Azure Site Recovery might be your affordable answer. Azure Site Recovery (ASR) can be used to replicate your on-premises or even other cloud-based servers…
Read More
credentialed scanning

Why You Should Perform Credentialed Vulnerability Scanning

Reading Time: 5 minutes
  • July 25, 2019
  • Security | Technology
Ideally, you would have more insight into vulnerabilities and potential means of exploitation in your environment than your adversaries (i.e., attackers) would. Performing credentialed…
Read More
Office 365 Data Loss Prevention

Office 365: Securing Information with Data Loss Prevention (DLP) Policies

Reading Time: 3 minutes
  • July 23, 2019
  • Office 365 | Security | Technology
Let’s talk about Office 365 Data Loss Prevention (DLP), what I feel is a very under-utilized feature by a lot of organizations. This is…
Read More
medical device security risk

How to Cut Medical Device Security Risks

Reading Time: 2 minutes
  • July 22, 2019
  • Managed Services | Security | Technology
One area within health care that continues to be a challenge for the industry is securing medical devices. As more of these devices connect…
Read More
IT security

Security vs Convenience in IT

Reading Time: 3 minutes
  • July 22, 2019
  • Information Technology | Security | Technology
When it comes to security in IT, there is a balance between how secure a network and its endpoints are and how useable the…
Read More
Decryption of blue digital data code

Microsoft Password Recommendations Have Changed

Reading Time: 2 minutes
  • July 12, 2019
  • Security | Technology
Over the past few months, Microsoft has changed its stance on password recommendations. Microsoft now recommends that passwords are not ever set to expire…
Read More
prevent compromised admin account attacks

Preventing Attacks From a Compromised Local Admin Account

Reading Time: 3 minutes
  • July 9, 2019
  • Security | Technology
You are likely aware that every Windows workstation has a built-in local administrator account. You may not be aware, however, of how common and…
Read More
Office 365 secure score

What Is Your Office 365 Secure Score?

Reading Time: 2 minutes
  • July 3, 2019
  • Cloud | Office 365 | Security | Technology
Security within the Cloud needs to be taken seriously. In fact now, more than ever, hackers are finding and exploiting information from organizations large…
Read More
« Previous Page1 … Page4 Page5 Page6 Page7 Page8 Page9 Next »

Accounting, Audit, Tax & Consulting

  • Outsourced Accounting
  • Audit
  • Tax
  • Consulting

Technology

  • Products
  • ERP & CRM Services
  • Business Intelligence
  • Office 365
  • Cloud & Infrastructure
  • Security & Compliance

Advisory

  • Business Succession Planning
  • Forensic & Valuation
  • Human Capital Management
  • Marketing & Communications
  • Retirement Plan Services
  • Investment Banking
  • Supply Chain
  • Insurance
  • Wealth Management
  • Transaction Advisory Services
  • Site Selection and Incentives
  • Regulatory, Quality & Compliance
  • Corporate Governance, Risk and Compliance
  • Workforce Risk Management

Company

  • About Sikich LLP
  • Corporate Development
  • Locations
  • Partners
  • Careers
  • News
  • Events
  • Blog
  • Client Login
  • Make a Payment

Connect With Us

Facebook-f Twitter Youtube Linkedin-in

©2023 All Rights Reserved.   Privacy Policy   Disclaimer

white sikich logo

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in settings.

Sikich LLP
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.