Executive Chat: Essential Cybersecurity Insights

In the third episode of the TechPulse Executive Chat series, the TechMD leadership team highlights the ever-evolving cybersecurity challenges for business leaders and the essential measures needed to keep your valuable data and networks safe.

What is the E-Rate Program and How Can my School Benefit from It?

Students and teachers are increasingly utilizing digital learning resources and tools as part of the K-12 educational process. To do so, fast, reliable internet access is crucial, which requires more and more bandwidth. However, fewer than half of US school districts meet the minimum bandwidth goals established by the Federal Communications Commission (FCC), resulting in […]

When Your Customers Experience Your Cybersecurity Problems

As many businesses understand, reputation and customer trust are very difficult to build and all too easy to lose. When a business experiences a data breach, their problems quickly become their customer’s problems. “Key Security Threats Facing Your M365 Environment and How to Protect It,” a recent webinar from the 1nteger’s cybersecurity team, explored a […]

Phishing That Lands a Trophy

By now, we all think we’re pretty savvy when it comes to recognizing phishing emails. But what about when you honestly can’t tell the difference between a malicious email and a genuine one? Phishing schemes are getting more sophisticated every day and even the most highly trained can be fooled. While Microsoft Defender for Office […]

Not All Employees are Created Equal when it Comes to Cybersecurity

When a new employee joins the organization, you most likely set up their user access and onboard them in the same way. The problem is that not all employees are created equally when it comes to cybersecurity and just one employee can cause a lot of damage. 85% of data breaches have a human aspect, […]

30 Cybersecurity Essentials Checklist

Use this checklist to ensure you’re accounting for privacy concerns, compliance issues, and the policies and procedures critical to maintaining a secure organization and a culture of cybersecurity. For more information, see our detailed summaries on the following pages. Download the Cybersecurity Essentials Checklist!

Microsoft 365 (M365) Phishing Has Gone DIY With PaaS/PhaaS Kits

Microsoft 365 (M365) Phishing has gone DIY with PaaS/PhaaS Kits

Digital equity is an important goal when it comes to providing Wi-Fi and reliable devices for those who need them. One thing, however, that should not be democratized is access to phishing applications. Yet, a new phishing-as-a-service (PaaS/PhaaS) tool called Greatness is making it easy and affordable for novice cybercriminals to create and conduct effective […]

When Multi-Factor Authentication Isn’t Enough to Protect Your Business from Cyberattacks

When Multi-Factor Authentication Isn’t Enough to Protect Your Business from Cyberattacks

Creating the silver bullet that stops all cyberattacks is quite complicated. The goal posts are always being moved due to rapid advancement by both technology and cybercriminals. Effective cybersecurity is all about layers, combining people, processes, and technology in a way that covers as many angles as possible. Throughout the years, anti-virus platforms, firewalls, endpoint […]

ICS Completes SOC 2 Type II Certification

TechMD SOC 2 Type II Compliant

ICS (now TechMD) understands the value of our client’s data to their reputation and future success. Because of this, ICS is proud to announce that it has achieved Service Organization Control (SOC) 2 Type II certification standard. SOC 2 compliance helps provide cybersecurity assurances to professional services firms and other companies that are working with […]

Russian Invasion Requires Increased Cybersecurity Alertness 

You have probably heard the news by now that Russia has invaded Ukraine, and this will likely have a major impact on the cybersecurity world moving forward. The U.S. Cybersecurity & Infrastructure Security Agency (CISA) is recommending that all American organizations be on high alert, especially small and mid-sized businesses as they are seen as softer targets for cybercriminals.

Top 3 Takeaways from the 2021 Verizon Data Breach Investigations Report 

Every year, Verizon releases their Data Breach Investigations Report (DBIR) and it usually contains some useful takeaways about how SMBs can protect themselves from cybercriminals. In case you haven’t read this 119-page report, here’s TechMD’s breakdown of the Top 3 most relevant takeaways for your business. 

Top 3 IT Priorities for 2022

2021 has been another year of “unprecedented times” as the COVID-19 pandemic has continued long past what many expected. With this continued level of uncertainty, it’s more important than ever that organizations have their IT in order and prioritized. Our team here at TechMD have put together three top IT priorities for 2022 to help you be prepared for the ever-changing IT landscape.

Webinar: Microsoft 365 and the Modern Workplace

Many organizations already have Microsoft 365 licenses but are not fully leveraging the productivity, collaboration, and security features that come built-in with Microsoft 365. Learn how you can maximize ROI with Microsoft 365 and take advantage of some of the key features that most businesses overlook.

TechMD is SSAE-19 Certified!

TechMD is proud to announce that we are now certified as operating under the Statement on Standards for Attestation Engagements (SSAE) No. 19, based on the Center for Internet Security’s (CIS) Critical Security Controls. We are one of the first Managed Service Providers in Southern California to have received this certification.

Zero-Day Exploit Affects Microsoft Exchange Servers

Microsoft has announced that Hafnium, a Chinese-backed cybercriminal organization, has been taking advantage of four zero-day exploits to attack on-premises Microsoft Exchange servers. We strongly recommend that any organizations with on-premises Exchange servers, including hybrid Office 365 setups, should apply Microsoft’s patch immediately.

Webinar: Building A Framework-Based Managed Security Program in Your Business

Cybersecurity has become an even hotter topic over the last 12 months as businesses have accelerated their plans to operate in virtual and remote environments. Despite the growth of sophisticated techniques used by cyber criminals, we know that 98% of data breaches can be prevented by implementing the Center for Internet Security’s Top 20 Critical Security Controls correctly.

Skip to content