Our Security Liaison Services
When talking with IT leaders at our customers, a common theme is keeping up with IT Security. If you are a smaller busin …
Taylor Mielke - Project Manager Employee Spotlight
Taylor has a passion for Sci-Fi movies (particularly Star Wars and the Prequels). Taylor tries to make at least one Viki …
New Threat - OneNote Attachments
Threat actors now use OneNote attachments in phishing emails that infect victims with remote access malware which can be …
Being prepared for your target acquisition
Company acquisition transactions can happen in many different ways. Whether you are a self-funded business looking to ac …
Why is SOC 2 Important?
SOC 2 (System and Organization Controls for Service Organizations) is essential on many levels. Cyber Advisors received …
Be Wary with Cyber Insurance
In the battered security landscape, companies are doing all they can to transfer risk out of their organizations. One of …
Cyber Advisors Security Updates May 2022
This month is another important month for Microsoft Patch Tuesday and subscribers of our Cyber Thursday blog, with 75 vu …
What’s with Operational Technology?
Operational Technology (OT) has become a very common talking point around the Cyber Advisors office. For starters, let’s …
Please Don’t Interrupt Me While I’m Interrupting
“Effective listening is more than simply avoiding the bad habit of interrupting others while they are speaking or finish …
Virtual Meeting Etiquette
In the past year, many companies have focused much of their efforts to make remote working a reality. Often times, we ar …