sikich logo
  • Services
    • Services
    • Technology Solutions
      • Technology Solutions
      • HEADSTART℠ Implementations
      • Modern Workplace
      • ERP Services
      • CRM Services
      • Cybersecurity
      • Data and Analytics
      • IT and Security Managed Services
      • Cloud Services
      • CRM and ERP Products
      • Spend Management
    • Accounting, Audit, Tax & Consulting
      • Accounting, Audit, Tax & Consulting
      • Outsourced Accounting
      • Audit & Assurance
      • Tax
      • Consulting Services
    • Advisory
      • Advisory
      • Business Succession Plan
      • Business Transformation
      • Forensic & Valuation
      • Human Capital Management & Payroll
      • Insurance Services
      • Regulatory, Quality & Compliance
      • Site Selection & Incentives
      • Transaction Advisory
      • Wealth Management
      • Investment Banking
      • Supply Chain
      • Marketing & Communications
      • Retirement Plan Services
      • Governance, Risk and Compliance Services
      • Workforce Risk Management
  • Industries
    • Industries
        • Manufacturing
          • Discrete Manufacturing
          • Industrial Equipment Manufacturing
          • Rolled Products
          • Manufacturing
        • Life Sciences
        • Agriculture
        • Government Contractors
        • Financial Services
        • Construction & Real Estate
        • Not-For-Profit
        • Government
          • Federal Government
          • State & Local Government
          • Government
        • Distribution & Supply Chain
        • Professional Services
        • Title IV Audit & Consulting
  • Insights
    • Insights
    • COVID-19 Resources
    • Blog & Resources
    • News
    • Events
    • Lessons From Leadership
  • About
    • About
    • Our Company
    • Our People
    • Locations
    • Awards
    • Partnerships
    • 2022 Annual Report
  • Careers
  • Contact

Cybersecurity

View All Sikich Insights

Sikich Applies CISA Best Practices to Businesses

Reading Time: 3 minutes
  • October 3, 2023
  • Security | Technology
In today’s ever-evolving digital landscape, cybersecurity should be a top priority for every organization. The Cybersecurity and Infrastructure Security Agency (CISA), a trusted authority…
Read More
configuring DMARC

7 Reasons Why Configuring DMARC Is Critical for Your Domain

Reading Time: 3 minutes
  • September 28, 2023
  • Information Technology | Security | Technology
Configuring DMARC (Domain-based Message Authentication, Reporting, and Conformance) for your domain isn’t just a best practice, it’s an essential step toward bolstering your organization’s…
Read More
PCI DSS 4.0 compliance

Steps to Overcome PCI DSS 4.0 Compliance Challenges

Reading Time: 5 minutes
  • September 28, 2023
  • Security | Technology
In today’s digital age, where payment card transactions are at the heart of countless financial activities, safeguarding sensitive cardholder data is paramount. The Payment…
Read More
how to disable unsafe ciphers in SonicWall

Boost Your Network Security: Disabling Unsafe Ciphers and Strengthening TLS Versions in SonicWall

Reading Time: 3 minutes
  • September 19, 2023
  • Information Technology | Security | Technology
In today’s digital world, keeping your network secure is more important than ever. SonicWall firewalls offer powerful tools to protect your network from potential…
Read More
data governance

Microsoft Purview: Breaking Information Barriers for Enhanced Data Governance

Reading Time: 4 minutes
  • September 14, 2023
  • Information Technology | Security | Technology
In today’s data-driven world, organizations face a significant challenge in managing and leveraging the vast amounts of data they generate and accumulate. Microsoft Purview,…
Read More
remote connectivity security

Zero Trust Network Access: The Next Generation of Remote Connectivity

Reading Time: 3 minutes
  • September 7, 2023
  • Information Technology | Security | Technology
Over the past few years, we have all become more accustomed to the option of remote work. Many different industries have had to put…
Read More
PCI INFI Worksheet

The New PCI INFI Worksheet

Reading Time: 2 minutes
  • August 30, 2023
  • Security | Technology
On June 28, 2023, the Payment Card Industry Security Standards Council (PCI SSC) published a new worksheet, “PCI DSS v4.x Items Noted for Improvement…
Read More
ERP implementation security

How to Maintain Security in an ERP Implementation

Reading Time: 6 minutes
  • August 7, 2023
  • Dynamics 365 Business Central | Dynamics 365 for Finance and Supply Chain Management | ERP | Security | Technology
“Businesses and users are going to embrace technology only if they can trust it.” – Satya Nadella, CEO, Microsoft That statement by Microsoft’s leader…
Read More
how to identify phishing and email scams

Phishing, It Can Happen to You: Identifying Phishing and Scam Emails

Reading Time: 9 minutes
  • July 28, 2023
  • Security | Technology
Phishing and scam emails are sent on a daily basis to millions of people. Not everyone can catch them every time. In fact, anyone,…
Read More
social engineering and ransomware

The Link Between Ransomware and Social Engineering

Reading Time: 6 minutes
  • July 27, 2023
  • Security | Technology
In cybersecurity circles, social engineering and ransomware attacks are like the chicken and the egg. One always comes first, and you can only have…
Read More
data privacy

Data Privacy: How to Protect Your Customers’ Personal Data

Reading Time: 4 minutes
  • July 20, 2023
  • Security | Technology
Nearly half (44%) of data breaches analyzed by IBM exposed personal customer information, including name, email, password and even healthcare data. According to Pew Research,…
Read More
ransomware defense

Your Team’s Ransomware Awareness is Your Best Line of Defense

Reading Time: 5 minutes
  • June 27, 2023
  • Security | Technology
People are the biggest threat to cybersecurity, especially ransomware, that insidious, increasing threat currently wreaking havoc on businesses of all sizes. In 2022, there…
Read More
Channel Futures MSP 501 award

Sikich Recognized on Channel Future’s MSP 501 List

Reading Time: 2 minutes
  • June 26, 2023
  • Security | Technology
Sikich was recently named to the Channel Futures MSP 501, a list of the world’s top managed service providers of 2023. Sikich ranked 64 on…
Read More
CIS benchmarks for cybersecurity best practices

What are CIS Benchmarks? 9 Things You Need to Know for Cybersecurity and Compliance

Reading Time: 11 minutes
  • May 24, 2023
  • Security | Technology
In today’s digital age, cybersecurity threats are ever-present and growing in complexity. Organizations of all sizes and industries are increasingly vulnerable to cyberattacks, which…
Read More
incident response plan

Incident Response Plans for Cybersecurity Breaches: A Guide

Reading Time: 4 minutes
  • May 22, 2023
  • Security | Technology
Cybersecurity incidents are costly, damaging and often undetectable for weeks on end. To make sure your business is prepared when a cyberattack strikes, you’ll…
Read More
anti-phishing policy

How to Add Users to Impersonation Section for Anti-Phishing Policy

Reading Time: 3 minutes
  • May 12, 2023
  • Information Technology | Security | Technology | Tips & Tricks
A common practice for Microsoft 365 Defender is to implement an anti-phishing policy. These policies protect email accounts from being spoofed. You can read…
Read More
cybersecurity controls

7 Cybersecurity Controls to Defend Against Emerging Cyberattacks in the New Threat Landscape

Reading Time: 7 minutes
  • May 8, 2023
  • Security | Technology
It only takes one misstep to leave your data vulnerable to cyberattacks. New vulnerabilities have emerged as companies adopt new technologies and new workplace practices….
Read More
ransomware protection

How to Test Your Business’s Ransomware Resiliency

Reading Time: 6 minutes
  • May 2, 2023
  • Security | Technology
In the first month of 2023, there were 33 publicly disclosed ransomware attacks. It was the highest number of attacks recorded in a single…
Read More
digital forensics

The Role of Digital Forensics in Fighting and Preventing Cybercrime

Reading Time: 6 minutes
  • April 26, 2023
  • Security | Technology
Digital forensics plays a key role in investigating cybercrime, preventing data breaches, providing evidence in legal cases, protecting intellectual property, and recovering lost data….
Read More
incident response plan

Incident Response Planning: A Vital Component of Your Cybersecurity Strategy

Reading Time: 8 minutes
  • April 24, 2023
  • Security | Technology
Cyber insurance providers and regulatory bodies require organizations to have a well-developed incident response program and demonstrate their readiness for potential cyber incidents. This…
Read More
« Previous Page1 Page2 Page3 … Page7 Next »

Accounting, Audit, Tax & Consulting

  • Outsourced Accounting
  • Audit
  • Tax
  • Consulting

Technology

  • Products
  • ERP & CRM Services
  • Business Intelligence
  • Office 365
  • Cloud & Infrastructure
  • Security & Compliance

Advisory

  • Business Succession Planning
  • Forensic & Valuation
  • Human Capital Management
  • Marketing & Communications
  • Retirement Plan Services
  • Investment Banking
  • Supply Chain
  • Insurance
  • Wealth Management
  • Transaction Advisory Services
  • Site Selection and Incentives
  • Regulatory, Quality & Compliance
  • Corporate Governance, Risk and Compliance
  • Workforce Risk Management

Company

  • About Sikich LLP
  • Corporate Development
  • Locations
  • Partners
  • Careers
  • News
  • Events
  • Blog
  • Client Login
  • Make a Payment

Connect With Us

Facebook-f Twitter Youtube Linkedin-in

©2023 All Rights Reserved.   Privacy Policy   Disclaimer

white sikich logo

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in .

Sikich LLP
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.