sikich logo
  • Services
    • Services
    • Technology Solutions
      • Technology Solutions
      • HEADSTART℠ Implementations
      • Modern Workplace
      • ERP Services
      • CRM Services
      • Cybersecurity
      • IT and Security Managed Services
      • Cloud Services
      • Digital Transformation
      • CRM and ERP Products
      • Spend Management
    • Accounting, Audit, Tax & Consulting
      • Accounting, Audit, Tax & Consulting
      • Outsourced Accounting
      • Audit & Assurance
      • Tax
      • Consulting Services
    • Advisory
      • Advisory
      • Business Succession Plan
      • Business Transformation
      • Forensic & Valuation
      • Human Capital Management & Payroll
      • Insurance Services
      • Regulatory, Quality & Compliance
      • Site Selection & Incentives
      • Transaction Advisory
      • Wealth Management
      • Investment Banking
      • Supply Chain
      • Marketing & Communications
      • Retirement Plan Services
      • Governance, Risk and Compliance Services
      • Workforce Risk Management
  • Industries
    • Industries
        • Manufacturing
          • Discrete Manufacturing
          • Industrial Equipment Manufacturing
          • Manufacturing
        • Life Sciences
        • Agriculture
        • Government Contractors
        • Financial Services
        • Construction & Real Estate
        • Not-For-Profit
        • Government
          • Federal Government
          • State & Local Government
          • Government
        • Distribution & Supply Chain
        • Professional Services
        • Title IV Audit & Consulting
  • Insights
    • Insights
    • COVID-19 Resources
    • Blog & Resources
    • News
    • Events
    • Lessons From Leadership
  • About
    • About
    • Our Company
    • Our People
    • Locations
    • Awards
    • Partnerships
  • Careers
  • Contact

Cybersecurity

View All Sikich Insights
Sikich Tech 360 Azure IT and Cybersecurity services

Sikich Tech 360 Azure IT and Cybersecurity Services Enhances Security and Performance in the Microsoft Cloud

Reading Time: 5 minutes
  • March 14, 2023
  • Azure | Cloud | Information Technology | Security | Technology
Security and performance management hurdles are major pain points for IT professionals in their day-to-day operations. Sikich has launched an updated version of our Tech…
Read More
how to detect malicious websites

How to Detect a Malicious Website

Reading Time: 4 minutes
  • March 8, 2023
  • Information Technology | Security | Technology
The old saying, “the pen is mightier than the sword,” might need a modern-day update, as it seems that the keyboard has become mightier…
Read More
internal insider IT threats

Internal IT Threats: How to Protect Your Business With Proactive Support

Reading Time: 5 minutes
  • February 22, 2023
  • Security | Technology
Your security is under threat. Every year, the risk of security breaches, data exposure, and hacking grows. Cybercrime is a lucrative business, with the…
Read More
managed services providers trends for 2023

6 IT Trends Managed Services Providers Will Support in 2023

Reading Time: 6 minutes
  • February 15, 2023
  • Information Technology | Managed Services | Security | Technology
This year, businesses must continue to be flexible and willing to adapt to new technologies amid changing customer and employee expectations. Unfortunately, most companies’ internal…
Read More
Chief Information Security Officer (CISO)

Use Your #1 Draft Pick on a CISO

Reading Time: 6 minutes
  • February 7, 2023
  • Information Technology | Security | Technology
Patrick Mahomes and Jalen Hurts were two of the best quarterbacks (QBs) in the NFL this season. Now, their teams are set to face…
Read More
keyed cryptographic hashes

What Are Keyed Cryptographic Hashes and Why Are They Required for PCI DSS 4.0?

Reading Time: 5 minutes
  • February 1, 2023
  • Security | Technology
Prior versions of the Payment Card Industry Data Security Standard (PCI DSS) permitted the use of hashes to render primary account number (PAN) unreadable…
Read More
cybersecurity predictions 2023

Cybersecurity Predictions for 2023

Reading Time: 2 minutes
  • January 31, 2023
  • Security | Technology
With 2022 in the books, the Sikich Cybersecurity practice is looking toward what the new year has in store. Members of the team offered…
Read More
protect your business against ransomware

Ransomware: How to Protect Your Business From Attack

Reading Time: 7 minutes
  • January 25, 2023
  • Managed Services | Security | Technology
Ransomware is one of the most dangerous of all the malicious programs on the internet. The FBI describes ransomware as “a type of malicious…
Read More
what is cyber insurance

Why Cyber Insurance Is Worth It for Your Business and What to Consider

Reading Time: 5 minutes
  • January 11, 2023
  • SharePoint | Technology
The FBI found a 300% increase in cybercrime since the start of the pandemic in 2020. How can you protect yourself against losses in…
Read More
security and compliance

Why You Need to Treat Security and Compliance Holistically

Reading Time: 4 minutes
  • December 13, 2022
  • Managed Services | Security | Technology
Just like chocolate and peanut butter, two foods that are arguably better together, compliance and security should ideally be intertwined for optimum outcomes. Every…
Read More
CMMC for DoD contractors

How Sikich’s STARS Program Assists DoD Contractors with CMMC Compliance Efforts

Reading Time: 6 minutes
  • December 6, 2022
  • Information Technology | Security | Technology
The Department of Defense (DoD) recently announced an update for its Cybersecurity Maturity Model Certification (CMMC) program, a program designed to make sure that…
Read More
how to create a cybersecurity plan

How to Create a Cybersecurity Plan for Your Business

Reading Time: 5 minutes
  • November 29, 2022
  • Security | Technology
As technologies advance, so too do cyber criminals. In a recent report, small business intelligence firm UpCity noted, “Cybercrime cost U.S. businesses more than…
Read More
home office cybersecurity

12 Ways to Defend Home Offices Against Cybersecurity Attacks

Reading Time: 8 minutes
  • November 7, 2022
  • Security | Technology
2020 sparked a dramatic shift in working styles, technology requirements, and general business operations. In a matter of weeks, employees were working from home,…
Read More
profit from cyber attacks

Top Ways Threat Actors Profit From Cyber Attacks

Reading Time: 4 minutes
  • October 27, 2022
  • Security | Technology
Today’s threat actors have numerous potential motivations for attacking systems and networks. Attackers may set out to destabilize economies, promote causes, infiltrate governments, or…
Read More
best cybersecurity business protection practices

October Is National Cybersecurity Awareness Month: Here Are 4 Ways to Protect Your Business

Reading Time: 6 minutes
  • October 1, 2022
  • Security | Technology
This October marks the 19th Cybersecurity Awareness Month, an occasion for governmental and private agencies to unite and promote cybersecurity best protection practices and…
Read More
data logs in a cyber security breach

Why Your Logs (Probably) Won’t Help You During a Cyber Breach

Reading Time: 6 minutes
  • August 17, 2022
  • Security | Technology
Sikich’s digital forensics and incident response team investigates a variety of different breach situations, including those involving ransomware events, ecommerce site compromises, account takeovers…
Read More
how to enable MFA for SonicWall firewall

How to Enable MFA for Your SonicWall Firewall

Reading Time: 3 minutes
  • July 5, 2022
  • Information Technology | Security | Technology
I have illustrated time and time again that MFA should no longer be considered a nice to have but a requirement when securing cloud…
Read More
best security practices with a Managed Security Services Provider

Best Security Practices With Managed Security Services Providers

Reading Time: 8 minutes
  • June 17, 2022
  • Security | Technology
For business owners, business growth is the name of the game. It’s important to establish protocols that can easily grow with your business to…
Read More
prepping to transition to PCI DSS v4.0

Prepping Your Organization for PCI DSS v4.0

Reading Time: 3 minutes
  • April 28, 2022
  • Security | Technology
The Payment Card Industry Security Standards Council (PCI SSC) has made public version 4.0 of the PCI Data Security Standard(PCI DSS). As part of…
Read More
state-sponsored cyber security risks

Understanding and Addressing Current Cybersecurity Risks

Reading Time: 5 minutes
  • April 27, 2022
  • Security | Technology
State-sponsored cybercrime is an urgent concern in the world’s current situation. Cyber threats and attacks continue to become more sophisticated and consequential. How can…
Read More
« Previous Page1 Page2 Page3 … Page6 Next »

Accounting, Audit, Tax & Consulting

  • Outsourced Accounting
  • Audit
  • Tax
  • Consulting

Technology

  • Products
  • ERP & CRM Services
  • Business Intelligence
  • Office 365
  • Cloud & Infrastructure
  • Security & Compliance

Advisory

  • Business Succession Planning
  • Forensic & Valuation
  • Human Capital Management
  • Marketing & Communications
  • Retirement Plan Services
  • Investment Banking
  • Supply Chain
  • Insurance
  • Wealth Management
  • Transaction Advisory Services
  • Site Selection and Incentives
  • Regulatory, Quality & Compliance
  • Corporate Governance, Risk and Compliance
  • Workforce Risk Management

Company

  • About Sikich LLP
  • Corporate Development
  • Locations
  • Partners
  • Careers
  • News
  • Events
  • Blog
  • Client Login
  • Make a Payment

Connect With Us

Facebook-f Twitter Youtube Linkedin-in

©2023 All Rights Reserved.   Privacy Policy   Disclaimer

white sikich logo

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in settings.

Sikich LLP
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.