Trusted Insight From Phoenix IT Experts
Resources to Keep Your Business Secure and Productive
Our team brings deep experience supporting law firms and professional service businesses—and we’re serious about sharing what we know.
These resources reflect the practical, security-first advice we offer our clients every day, so you can make smarter IT decisions and stay focused on what matters most.
[{"id":"F1VKiAZpR_-UeW34P_5ivA","title":"Why Antivirus Software Cannot Stop Ransomware","slugPrefix":"resources/","slug":"why-antivirus-software-cannot-stop-ransomware","_modelApiKey":"resource","_firstPublishedAt":"2022-04-19T21:41:24-04:00","_createdAt":"2025-08-02T21:38:58-04:00","tags":[{"id":"HB24S9itST6l0PPTPfGtdQ","slug":"security","tag":"Security"}],"pageTemplate":{"pageContentSections":[{"_modelApiKey":"section_content_basic","id":"fXibuFIjQCS9tedlpNS32A","contentWordCounter":{"words":585,"characters":3287,"specialCharacters":77,"sentences":59,"paragraphs":40,"commonWords":{"365":1,"and":28,"to":18,"security":14,"your":12,"a":11,"software":11,"the":10,"is":8,"this":8,"are":7,"it":6,"soc":6,"you":6,"antivirus":5,"in":5,"av":4,"bad":4,"before":4,"can":4,"for":4,"information":4,"of":4,"on":4,"siem":4,"that":4,"they":4,"threat":4,"threats":4,"what":4,"actors":3,"by":3,"catch":3,"cyber":3,"from":3,"if":3,"it’s":3,"layered":3,"longer":3,"monitoring":3,"must":3,"protection":3,"response":3,"risk":3,"up":3,"when":3,"activity":2,"alone":2,"an":2,"attackers":2,"but":2,"continually":2,"damage":2,"data":2,"defenses":2,"evolve":2,"evolving":2,"filtering":2,"have":2,"immediately":2,"insurance":2,"last":2,"liability":2,"malicious":2,"management":2,"modern":2,"new":2,"not":2,"or":2,"respond":2,"review":2,"scans":2,"should":2,"systems":2,"their":2,"time":2,"too":2,"tool":2,"tools":2,"updates":2,"viruses":2,"why":2,"year":2,"years":2,"24/7":1,"able":1,"about":1,"access":1,"act":1,"action":1,"actor":1,"addressing":1,"advanced":1,"after":1,"against":1,"ago":1,"all":1,"already":1,"always":1,"amounts":1,"analysis":1,"analysts":1,"annually":1,"anyone":1,"applications":1,"applied":1,"approach ":1,"aren’t":1,"arsenal":1,"as":1,"assessments":1,"attempt":1,"authentication":1,"authorization":1,"automatic":1,"backup":1,"backups":1,"be":1,"because":1,"behind":1,"being":1,"breach":1,"build":1,"bypass":1,"cause":1,"causes":1,"center":1,"checklist":1,"clear":1,"code":1,"company":1,"components":1,"compromise":1,"computer":1,"conducting":1,"configure":1,"confirmed":1,"consideration":1,"content":1,"continuous":1,"controls":1,"countermeasures":1,"cover":1,"create":1,"critical":1,"cyber-attack":1,"cybersecurity":1,"dark":1,"defend":1,"defense":1,"delay":1,"delete":1,"deleting":1,"designated":1,"detailed":1,"detect":1,"developers":1,"directories":1,"disaster":1,"dns/web":1,"do":1,"does":1,"doing":1,"don’t":1,"duration":1,"email":1,"employees":1,"encryption":1,"endpoint":1,"enough":1,"especially":1,"essential":1,"evaluate":1,"event":1,"events":1,"every":1,"evolution":1,"expand":1,"expanding":1,"expecting":1,"exposure":1,"falling":1,"far":1,"files":1,"finds":1,"firm’s":1,"five":1,"for ":1,"gaps":1,"get":1,"gives":1,"grow":1,"here":1,"human":1,"identifies":1,"identify":1,"important":1,"improve":1,"inactivity":1,"incidents":1,"include":1,"includes":1,"increasing":1,"indicators":1,"infiltrate":1,"infiltrating":1,"insurers":1,"investigate":1,"item":1,"just":1,"keep":1,"know":1,"known":1,"known ":1,"landscape":1,"latest":1,"lock":1,"logs":1,"malware":1,"matter":1,"meeting":1,"mfa":1,"microsoft":1,"minimum":1,"more":1,"much":1,"multi-factor":1,"multi-layered":1,"multiple":1,"neutralize":1,"never-before-seen":1,"no":1,"off-site":1,"officer":1,"one":1,"only":1,"operations":1,"opportunity":1,"other":1,"passwords":1,"patch":1,"patterns":1,"phishing":1,"physical":1,"place":1,"plan":1,"plans":1,"potential":1,"prevents":1,"proactive":1,"procedures":1,"product":1,"progress":1,"provides":1,"purge":1,"quickly":1,"ransomware":1,"rapid":1,"react":1,"real":1,"recently":1,"recognizes":1,"recovery":1,"regular":1,"regularly—at":1,"rely":1,"relying":1,"removes":1,"requires":1,"reviewed":1,"revisited":1,"same":1,"screen":1,"seim":1,"sent":1,"serious":1,"service":1,"services":1,"short":1,"siem—and":1,"sift":1,"significantly":1,"simply":1,"simulated":1,"since":1,"so":1,"some":1,"something":1,"sources":1,"stack":1,"staffed":1,"stop":1,"strategy":1,"strong":1,"stronger":1,"subtle":1,"suspicious":1,"system":1,"teams":1,"tests":1,"than":1,"that’s":1,"them":1,"these":1,"things":1,"through":1,"today’s":1,"toolbox":1,"tracking":1,"tracks":1,"traditional":1,"training":1,"transfer":1,"trying":1,"until":1,"update":1,"use":1,"used":1,"using":1,"valuable":1,"vast":1,"web":1,"who":1,"who’s":1,"will":1,"window":1,"wire":1,"with":1,"won’t":1,"worked":1,"works":1,"worth":1,"you’ve":1},"readingTime":"~ 3 minutes","settings":{"includeSpace":false,"includeHTML":false}}},{}]},"listing":{"title":"Why Antivirus Software Cannot Stop Ransomware","subTitle":"","excerpt":"Traditional antivirus leaves gaps. SOC and SIEM services provide stronger, 24/7 ransomware defense.","mediaAsset":{"assetType":{"id":"e8JVztreTjKZ6sSxOfBeRA","image":{"responsiveImage":{"src":"https://www.datocms-assets.com/147131/1755100026-istock-1345658709.jpg","srcSet":"https://www.datocms-assets.com/147131/1755100026-istock-1345658709.jpg?dpr=0.25 661w,https://www.datocms-assets.com/147131/1755100026-istock-1345658709.jpg?dpr=0.5 1322w,https://www.datocms-assets.com/147131/1755100026-istock-1345658709.jpg?dpr=0.75 1983w,https://www.datocms-assets.com/147131/1755100026-istock-1345658709.jpg 2644w","width":2644,"height":1133,"alt":"antivirus graphic","title":null,"base64":"data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wCEAAoHBwgHBgoICAgLEAoXDhgVDg0VDhEPDg4MFxUdGBYTFhUaHysjHR0oHRUiJDUlKC0vMjIyGSI4PTcwPCsxMi8BCgsLDg0OHBAQHC8cFh01Ly81Ly8vLy8vLy87Ly8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vL//AABEIAAsAGAMBIgACEQEDEQH/xAAZAAABBQAAAAAAAAAAAAAAAAADAAEEBQb/xAAeEAABBAIDAQAAAAAAAAAAAAABAAIDEwQiESExBf/EABcBAAMBAAAAAAAAAAAAAAAAAAEEBQD/xAAYEQACAwAAAAAAAAAAAAAAAAAAAQIRIf/aAAwDAQACEQMRAD8AycmNGJRyVKnwYZMcbBVeW51g7KLY+obFMkB4GPzImw+p0N73UDYpI2ZTZ//Z","sizes":"(max-width: 2644px) 100vw, 2644px"},"focalPoint":{"x":0.5,"y":0.5}}}}}},{"id":"XbWVBW-8SwCkOlCScm5Dxg","title":"Can a HIPAA Violation Result in Malpractice?","slugPrefix":"resources/","slug":"can-a-hipaa-violation-result-in-malpractice","_modelApiKey":"resource","_firstPublishedAt":"2015-09-08T21:37:42-04:00","_createdAt":"2025-08-02T21:34:44-04:00","tags":[{"id":"HB24S9itST6l0PPTPfGtdQ","slug":"security","tag":"Security"}],"pageTemplate":{"pageContentSections":[{"_modelApiKey":"section_content_basic","id":"dMuRrIncQ1eu-ztodOypBw","contentWordCounter":{"words":619,"characters":3528,"specialCharacters":82,"sentences":52,"paragraphs":32,"commonWords":{"10":1,"17":1,"2013":1,"2014":1,"and":29,"the":26,"to":19,"for":12,"hipaa":12,"privacy":11,"in":10,"with":10,"a":9,"your":8,"are":7,"her":7,"walgreens":7,"i":6,"of":6,"that":6,"as":5,"data":5,"not":5,"pharmacist":5,"policies":5,"used":5,"be":4,"information":4,"is":4,"requirements":4,"this":4,"but":3,"compliance":3,"confidential":3,"did":3,"ensure":3,"have":3,"laws":3,"lawsuits":3,"malpractice":3,"negligence":3,"other":3,"procedures":3,"security":3,"standard":3,"standards":3,"subject":3,"support":3,"their":3,"was":3,"will":3,"woman":3,"you":3,"all":2,"an":2,"any":2,"breaches":2,"business":2,"child":2,"clearly":2,"clients":2,"comply":2,"employees":2,"evaluate":2,"even":2,"expanding":2,"fbi":2,"firm":2,"how":2,"husband":2,"if":2,"jury":2,"law":2,"legal":2,"may":2,"medical":2,"obtain":2,"organizations":2,"party":2,"practices":2,"private":2,"protection":2,"prove":2,"responsible":2,"risks":2,"she":2,"subcontractors":2,"sue":2,"sued":2,"then":2,"use":2,"violating":2,"where":2,"$1.44":1,"&":1,"-neal":1,"20%":1,"80%":1,"accepted":1,"access":1,"accessed":1,"accountability":1,"accountable":1,"act":1,"acting":1,"actions":1,"addition":1,"admitted":1,"affair":1,"after":1,"agreement":1,"align":1,"already":1,"also":1,"and/or":1,"approach":1,"april":1,"argued":1,"assess":1,"associate":1,"assume":1,"assurances":1,"at":1,"attempted":1,"attorney":1,"authority":1,"authorization":1,"awarded":1,"been":1,"below":1,"biggest":1,"both":1,"breach":1,"businesses":1,"by":1,"care":1,"case":1,"claim":1,"claims":1,"commonly":1,"communicate":1,"complex":1,"complying":1,"concept":1,"conduct":1,"consent":1,"consequence":1,"consequences":1,"consider":1,"contractors":1,"could":1,"court":1,"current":1,"currently":1,"customer":1,"defenses":1,"designate":1,"designed":1,"directly":1,"disclosure":1,"discuss":1,"disease":1,"dropping":1,"encrypt":1,"encrypted":1,"encryption":1,"engage":1,"enough":1,"environment":1,"establish":1,"ethical":1,"evaluating":1,"eventually":1,"evidence":1,"evolving":1,"expected":1,"f":1,"failing":1,"failure":1,"federal":1,"fell":1,"fines":1,"firm’s":1,"follow":1,"formally":1,"found":1,"from":1,"getting":1,"government":1,"guidelines":1,"had":1,"harbor":1,"has":1,"he":1,"health":1,"healthcare":1,"held":1,"help":1,"here":1,"hipaa’s":1,"history":1,"including":1,"increasing":1,"increasingly":1,"indiana":1,"individual":1,"industries":1,"industry":1,"influence":1,"injury":1,"instance":1,"insurance":1,"into":1,"isn’t":1,"jefferson":1,"keep":1,"knew":1,"landscape":1,"like":1,"long":1,"maintaining":1,"manage":1,"many":1,"matters":1,"meet":1,"memo":1,"million":1,"minimum":1,"more":1,"most":1,"much":1,"necessary ":1,"negligent":1,"networks":1,"note":1,"noted":1,"now":1,"often":1,"of ":1,"on":1,"opportunities":1,"or":1,"originally":1,"otherwise":1,"oversee":1,"parties":1,"penalties":1,"people":1,"perception":1,"perimeter":1,"personal":1,"pharmacist’s":1,"place":1,"portability":1,"possible":1,"potential":1,"pressure":1,"professional":1,"provides":1,"recent":1,"recognizing":1,"records":1,"reduce":1,"regulatory":1,"remaining":1,"required":1,"respond":1,"responsibilities":1,"result":1,"resulting":1,"review":1,"risk":1,"safe":1,"safeguards":1,"safest":1,"secure":1,"sensitive":1,"separate":1,"sexually":1,"shared":1,"similarly":1,"simply":1,"single":1,"situations":1,"state":1,"states":1,"still":1,"strategies":1,"strengthen":1,"succeeded":1,"sure":1,"suspecting":1,"system":1,"than":1,"they":1,"third":1,"third-party":1,"though":1,"together":1,"top":1,"total":1,"train":1,"transmitted":1,"transmitting":1,"unauthorized":1,"understand":1,"update":1,"using":1,"vendors":1,"viewed":1,"violated":1,"visible":1,"vulnerability":1,"we":1,"were":1,"what":1,"when":1,"wherever":1,"while":1,"why":1,"without":1,"working":1,"written":1,"yardstick":1,"years":1,"you’re":1},"readingTime":"~ 3 minutes","settings":{"includeSpace":false,"includeHTML":false}}},{}]},"listing":{"title":"Can a HIPAA Violation Result in Malpractice?","subTitle":"","excerpt":"HIPAA violations increasingly serve as evidence in malpractice and negligence lawsuits, raising compliance stakes.","mediaAsset":{"assetType":{"id":"MX7EvwIdQkS0ebigo5R0aQ","image":{"responsiveImage":{"src":"https://www.datocms-assets.com/147131/1755100895-istock-934679414.jpg","srcSet":"https://www.datocms-assets.com/147131/1755100895-istock-934679414.jpg?dpr=0.25 530w,https://www.datocms-assets.com/147131/1755100895-istock-934679414.jpg?dpr=0.5 1060w,https://www.datocms-assets.com/147131/1755100895-istock-934679414.jpg?dpr=0.75 1590w,https://www.datocms-assets.com/147131/1755100895-istock-934679414.jpg 2121w","width":2121,"height":1414,"alt":"A doctors laptop sits opened","title":null,"base64":"data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wCEAAoHBwgHBgoICAgLChALDhgQDg0XDhQQDQ0VFxUZGCITFhUaHysjGh0oHRUWJDUlKC0vMjIyGSI4PTcwPCsxMi8BCgsLDg0PEA0QEC8oFhwvLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vL//AABEIABAAGAMBIgACEQEDEQH/xAAXAAADAQAAAAAAAAAAAAAAAAAABQYC/8QAHhAAAgMAAQUAAAAAAAAAAAAAAQIAAwQFERIVIjH/xAAWAQEBAQAAAAAAAAAAAAAAAAADAgD/xAAXEQEAAwAAAAAAAAAAAAAAAAAAAQIS/9oADAMBAAIRAxEAPwBdnzsNAKiUgO5cwFan5MYs9RsBAlFnQsnaqiLNhEvEeZa89FMJU8dVpru9VEJG2f/Z","sizes":"(max-width: 2121px) 100vw, 2121px"},"focalPoint":{"x":0.5,"y":0.5}}}}}},{"id":"CCGCNSZhSQe44VVQ1KjFlQ","title":"5 Ways an MSP Should Help with HIPAA Compliance","slugPrefix":"resources/","slug":"5-ways-an-msp-should-help-with-hipaa-compliance","_modelApiKey":"resource","_firstPublishedAt":"2015-12-21T21:34:36-05:00","_createdAt":"2025-08-02T21:32:22-04:00","tags":[{"id":"HB24S9itST6l0PPTPfGtdQ","slug":"security","tag":"Security"}],"pageTemplate":{"pageContentSections":[{"_modelApiKey":"section_content_basic","id":"QULpyPTiSxe_d05fCdwQVA","contentWordCounter":{"words":495,"characters":2687,"specialCharacters":67,"sentences":39,"paragraphs":23,"commonWords":{"1":1,"2":1,"3":1,"4":1,"5":1,"2013":1,"and":21,"to":17,"the":16,"a":11,"compliance":11,"hipaa":10,"of":10,"should":10,"your":10,"as":7,"law":7,"msp":7,"with":7,"in":6,"is":6,"it":6,"are":5,"business":5,"data":5,"that":5,"any":4,"be":4,"encryption":4,"firm":4,"firms":4,"for":4,"providers":4,"secure":4,"you":4,"access":3,"associates":3,"breach":3,"healthcare":3,"help":3,"helps":3,"maintain":3,"on":3,"or":3,"provide":3,"risk":3,"was":3,"an":2,"audit":2,"both":2,"can":2,"clients":2,"cloud":2,"covered":2,"encrypted":2,"ensure":2,"essential":2,"establish":2,"from":2,"health":2,"managed":2,"mobile":2,"msps":2,"need":2,"other":2,"partner":2,"password":2,"policy":2,"prevent":2,"regularly":2,"reporting":2,"sensitive":2,"service":2,"share":2,"status":2,"technology":2,"their":2,"this":2,"tools":2,"training":2,"ways":2,"we":2,"work":2,"would":2,"able":1,"accountability":1,"act":1,"activity":1,"adopting":1,"advise":1,"all":1,"almost":1,"arms":1,"assistance":1,"associate":1,"associated":1,"associates,”":1,"assure":1,"at":1,"below":1,"breaches":1,"change":1,"client":1,"communication":1,"companies":1,"confirm":1,"considered":1,"create":1,"current":1,"decisions":1,"detect":1,"device":1,"devices—including":1,"documenting":1,"effective":1,"email":1,"employee":1,"enable":1,"enforced":1,"entities":1,"entities”":1,"entity":1,"equally":1,"especially":1,"even":1,"event":1,"ever":1,"example":1,"expected":1,"experiences":1,"facilities":1,"facility":1,"factors":1,"files":1,"five":1,"full":1,"future":1,"goal":1,"handle":1,"helping":1,"hipaa—whether":1,"how":1,"if":1,"impact":1,"implement":1,"important":1,"include":1,"includes":1,"increase":1,"information":1,"information—put":1,"infrastructure":1,"insurance":1,"invested":1,"involve":1,"itself":1,"know":1,"laptops":1,"last":1,"liable":1,"long":1,"lost":1,"lot":1,"maintaining":1,"malware":1,"manage":1,"medical":1,"messaging":1,"methodology":1,"modified":1,"monitoring":1,"most":1,"msp’s":1,"networks":1,"occurring":1,"on-site":1,"one":1,"ongoing":1,"organizations":1,"passwords":1,"penalties":1,"permissions":1,"phones—are":1,"place":1,"platforms":1,"portability":1,"potential":1,"pressure":1,"private":1,"process":1,"protect":1,"protected":1,"proven":1,"puts":1,"rapid":1,"reaching":1,"reduce":1,"reduces":1,"remotely":1,"reported":1,"requirements":1,"responding":1,"restrictions":1,"right":1,"rise":1,"robust":1,"role":1,"safeguards":1,"said":1,"same":1,"side-by-side":1,"simply":1,"so":1,"solid":1,"stolen":1,"store":1,"strong":1,"subject":1,"such":1,"support":1,"susceptible":1,"system":1,"tablets":1,"therefore":1,"they":1,"those":1,"total":1,"track":1,"unauthorized":1,"understands":1,"updated":1,"verify":1,"well":1,"when":1,"whether":1,"which":1,"who":1,"whoever":1,"why":1,"wide":1,"working":1,"you’re":1,"“business":1,"“covered":1},"readingTime":"~ 3 minutes","settings":{"includeSpace":false,"includeHTML":false}}},{}]},"listing":{"title":"5 Ways an MSP Should Help with HIPAA Compliance","subTitle":"","excerpt":"Encryption, access audits, policies, and training are just a few ways MSPs support HIPAA compliance.","mediaAsset":{"assetType":{"id":"QLiadOO_S6CH9ffk_GrvEQ","image":{"responsiveImage":{"src":"https://www.datocms-assets.com/147131/1755100176-istock-1406956145.jpg","srcSet":"https://www.datocms-assets.com/147131/1755100176-istock-1406956145.jpg?dpr=0.25 530w,https://www.datocms-assets.com/147131/1755100176-istock-1406956145.jpg?dpr=0.5 1060w,https://www.datocms-assets.com/147131/1755100176-istock-1406956145.jpg?dpr=0.75 1590w,https://www.datocms-assets.com/147131/1755100176-istock-1406956145.jpg 2121w","width":2121,"height":1414,"alt":"it admin works on a computer","title":null,"base64":"data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wCEAAoHBwgHBgoICAgLExULDhgQFhUNDh0PEhUYFx0ZGCITFhUdHysjGh0oHSEWJDUlKC0vMjIyGSI4PTcwPCsxMi8BCgsLDg0OHBAQHC8dIig7Ly81Ly8vLy8vNS8vLy8vLzUvLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vL//AABEIABAAGAMBIgACEQEDEQH/xAAWAAEBAQAAAAAAAAAAAAAAAAAGAAf/xAAeEAABBQACAwAAAAAAAAAAAAABAAIDBAUGESExkf/EABYBAQEBAAAAAAAAAAAAAAAAAAIDAP/EABgRAQADAQAAAAAAAAAAAAAAAAEAAhED/9oADAMBAAIRAxEAPwBVoXqdeQdPCQ5GpA+qCHBYVc0bUjwXPP1L+P7JjpAPcfSyIxGMZcpvQTQddqQnY3Y3N8lSvWzkLzJ//9k=","sizes":"(max-width: 2121px) 100vw, 2121px"},"focalPoint":{"x":0.5,"y":0.5}}}}}},{"id":"b_5si_P5QpOCqvzaqXxdhQ","title":"Ethics and Metadata: What Law Firms Need to Understand","slugPrefix":"resources/","slug":"ethics-and-metadata-what-law-firms-need-to-understand","_modelApiKey":"resource","_firstPublishedAt":"2017-06-09T21:28:00-04:00","_createdAt":"2025-08-02T21:26:24-04:00","tags":[{"id":"HB24S9itST6l0PPTPfGtdQ","slug":"security","tag":"Security"}],"pageTemplate":{"pageContentSections":[{"_modelApiKey":"section_content_basic","id":"F8g_dQJkTz2vDGsR5WaUAw","contentWordCounter":{"words":473,"characters":2769,"specialCharacters":84,"sentences":44,"paragraphs":34,"commonWords":{"and":19,"metadata":19,"of":13,"your":9,"management":8,"risks":8,"the":8,"to":8,"a":7,"information":7,"for":6,"it":6,"or":6,"risk":6,"be":5,"is":5,"review":5,"can":4,"changes":4,"in":4,"when":4,"you":4,"addresses":3,"are":3,"confidential":3,"disclosure":3,"er":3,"ethics":3,"firms":3,"from":3,"inadvertent":3,"law":3,"on":3,"opinion":3,"procedures":3,"sensitive":3,"software":3,"such":3,"that":3,"with":3,"–":3,"07-03":2,"advises":2,"also":2,"as":2,"at":2,"but":2,"clients":2,"comments":2,"confidentiality":2,"created":2,"data":2,"details":2,"do":2,"effective":2,"email":2,"have":2,"history":2,"last":2,"legal":2,"managing":2,"microsoft":2,"more":2,"often":2,"policy":2,"regular":2,"should":2,"there":2,"they":2,"this":2,"track":2,"using":2,"we":2,"were":2,"1.6":1,"4.4":1,"8.4":1,"accessed":1,"address":1,"adequately":1,"ago":1,"an":1,"annually":1,"any":1,"approach":1,"approaches":1,"areas":1,"arizona":1,"assess":1,"associated":1,"attachments":1,"author":1,"authored":1,"automatic":1,"automatically":1,"avoiding":1,"bar":1,"bcc":1,"because":1,"been":1,"blind":1,"by":1,"captured":1,"carbon":1,"choosing":1,"client":1,"coming":1,"communications":1,"compliance":1,"comply":1,"consent":1,"consider":1,"contain":1,"copy":1,"critical":1,"date/timestamps":1,"dates":1,"describes":1,"didn’t":1,"document":1,"easy":1,"edit":1,"edited":1,"electronic":1,"embedded":1,"employees":1,"ethical":1,"evaluated":1,"evolution":1,"evolve":1,"examples":1,"expands":1,"externally":1,"file":1,"files":1,"firm":1,"following":1,"gps":1,"guidance":1,"guide":1,"hands":1,"help":1,"helpful":1,"hidden":1,"higher-risk":1,"how":1,"if":1,"implementing":1,"include":1,"includes":1,"informed":1,"instructions":1,"intend":1,"internally":1,"into":1,"ip":1,"it’s":1,"larger":1,"lawyers":1,"least":1,"like":1,"location":1,"maintaining":1,"make":1,"making":1,"managed":1,"many":1,"matters":1,"may":1,"minimize":1,"misconduct":1,"modified":1,"multiple":1,"must":1,"networks":1,"never":1,"newer":1,"not":1,"obtaining":1,"office":1,"one":1,"ongoing—it’s":1,"original":1,"other":1,"others":1,"overlook":1,"part":1,"phone’s":1,"photo":1,"place":1,"plan":1,"policies":1,"practice":1,"precautions":1,"prevent":1,"preventative":1,"privileged":1,"process":1,"profile":1,"profiles":1,"progress":1,"properties—when":1,"protect":1,"protecting":1,"provides":1,"questions":1,"reasonable":1,"recipients":1,"recommend":1,"references":1,"regularly":1,"remember":1,"removal":1,"remove":1,"require":1,"requirements":1,"respect":1,"reveal":1,"reviewed":1,"reviewing":1,"revisions":1,"rights":1,"routing":1,"rules":1,"running":1,"scrubbing":1,"sender/recipient":1,"share":1,"sharing":1,"sometimes":1,"staff":1,"standpoint":1,"state":1,"technology":1,"their":1,"them":1,"through":1,"tools":1,"total":1,"tracking":1,"trained":1,"types":1,"understand":1,"understanding":1,"unintended":1,"update":1,"updated":1,"use":1,"useful":1,"was":1,"where":1,"who":1,"why":1,"word’s":1,"years":1,"“finished.”":1,"“hidden,”":1,"“take":1},"readingTime":"~ 3 minutes","settings":{"includeSpace":false,"includeHTML":false}}},{}]},"listing":{"title":"Ethics and Metadata: What Law Firms Need to Understand","subTitle":"","excerpt":"Hidden metadata in documents can expose sensitive client data and create serious ethical risks for firms.","mediaAsset":{"assetType":{"id":"IS5YovzyS6iIGE1sQ9hMOA","image":{"responsiveImage":{"src":"https://www.datocms-assets.com/147131/1755099318-istock-1413938693.jpg","srcSet":"https://www.datocms-assets.com/147131/1755099318-istock-1413938693.jpg?dpr=0.25 530w,https://www.datocms-assets.com/147131/1755099318-istock-1413938693.jpg?dpr=0.5 1060w,https://www.datocms-assets.com/147131/1755099318-istock-1413938693.jpg?dpr=0.75 1590w,https://www.datocms-assets.com/147131/1755099318-istock-1413938693.jpg 2121w","width":2121,"height":1414,"alt":"a person on a laptop with a graphic to represnet ethics","title":null,"base64":"data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wCEAAoHBwgHBgoICAgLCgoUDhgQDhkNDhYVFQ0VFxodHRYTFhUmHy0jGh0oHRUWJDUlKC0vMjIyHSI4PTcwPCsxMi8BCgsLDg0OFg0MHS8cFhwvLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vL//AABEIABAAGAMBIgACEQEDEQH/xAAYAAACAwAAAAAAAAAAAAAAAAAGBwACBP/EABsQAAEFAQEAAAAAAAAAAAAAAAEAAgMEBSER/8QAFQEBAQAAAAAAAAAAAAAAAAAAAQL/xAAZEQACAwEAAAAAAAAAAAAAAAAAEgIRIgH/2gAMAwEAAhEDEQA/AA/SyRI8FwVXYteSsAQji3kNc3oWmlhVTD7IE8YMiws5tOrD1pUTLv4GTJH45oUSsibif//Z","sizes":"(max-width: 2121px) 100vw, 2121px"},"focalPoint":{"x":0.5,"y":0.5}}}}}},{"id":"DWp8P8fbSDO3LLAO_ksnQQ","title":"Should I Insource or Outsource my IT?","slugPrefix":"resources/","slug":"should-i-insource-or-outsource-my-it","_modelApiKey":"resource","_firstPublishedAt":"2017-08-08T21:26:16-04:00","_createdAt":"2025-08-02T21:24:17-04:00","tags":[{"id":"HB24S9itST6l0PPTPfGtdQ","slug":"security","tag":"Security"}],"pageTemplate":{"pageContentSections":[{"_modelApiKey":"section_content_basic","id":"MeatCchbT1-KNBs_gp41BQ","contentWordCounter":{"words":956,"characters":4987,"specialCharacters":152,"sentences":65,"paragraphs":30,"commonWords":{"100":1,"and":33,"the":25,"to":24,"a":21,"it":20,"that":18,"your":18,"of":17,"are":15,"is":14,"you":13,"it’s":12,"have":10,"managed":10,"services":9,"with":9,"on":8,"or":8,"providers":8,"service":8,"they":8,"for":7,"if":7,"in":7,"not":7,"this":7,"an":6,"generally":6,"support":6,"technology":6,"there":6,"will":6,"all":5,"be":5,"firms":5,"more":5,"systems":5,"tools":5,"what":5,"working":5,"being":4,"best":4,"company":4,"ensure":4,"help":4,"in-house":4,"issues":4,"monitoring":4,"team":4,"alert":3,"always":3,"can":3,"employees":3,"firm":3,"focus":3,"focused":3,"from":3,"has":3,"how":3,"just":3,"many":3,"may":3,"mix":3,"model":3,"my":3,"network":3,"outsourcing":3,"provide":3,"provider":3,"really":3,"software":3,"some":3,"staff":3,"system":3,"term":3,"time":3,"use":3,"when":3,"while":3,"work":3,"able":2,"about":2,"almost":2,"approach":2,"approaches":2,"around":2,"as":2,"ask":2,"automation":2,"but":2,"buying":2,"by":2,"check":2,"clients":2,"coverage":2,"department":2,"don’t":2,"essential":2,"fit":2,"hardware":2,"however":2,"improve":2,"in-detail":2,"internal":2,"larger":2,"limited":2,"lot":2,"management":2,"need":2,"needs":2,"offer":2,"office":2,"one":2,"out":2,"over":2,"partners":2,"people":2,"performance":2,"planning":2,"plans":2,"potential":2,"proactively":2,"responsibilities":2,"right":2,"sales":2,"services’":2,"shift":2,"since":2,"skeptical":2,"something":2,"targeting":2,"total":2,"two":2,"types":2,"understand":2,"up":2,"vendors":2,"very":2,"we":2,"why":2,"won’t":2,"worst":2,"you’ve":2,"‘managed":2,"&":1,"about ":1,"accounting":1,"address":1,"advantage":1,"advantages":1,"after":1,"again":1,"alerting":1,"aligned":1,"allowing":1,"allows":1,"also":1,"answer":1,"anticipate":1,"any":1,"anybody":1,"anything":1,"appreciate":1,"approach?”":1,"apt":1,"aren’t":1,"assist":1,"at":1,"attention":1,"automated/cloud":1,"avoidable":1,"away":1,"backup":1,"bang":1,"because":1,"been misused":1,"before":1,"better":1,"between":1,"broken":1,"buck":1,"business":1,"buy":1,"call":1,"called":1,"calling":1,"case":1,"cause":1,"certification":1,"checks":1,"choose":1,"chosen":1,"clock":1,"close":1,"comes":1,"companies":1,"company’s":1,"complete":1,"compliance":1,"comprehensive":1,"connect":1,"connection":1,"connectivity":1,"consider":1,"considering":1,"constantly":1,"continue":1,"core":1,"correctly":1,"cost":1,"could":1,"course":1,"create":1,"created":1,"data":1,"day-to-day":1,"deal":1,"delivery":1,"demand":1,"depend":1,"describe":1,"different":1,"ditto":1,"do":1,"does":1,"done":1,"down":1,"downtime":1,"during":1,"economies":1,"efficiency":1,"efficient":1,"either":1,"end":1,"enter":1,"entirely":1,"equal":1,"error":1,"evaluating":1,"even":1,"every":1,"example":1,"experience":1,"experienced":1,"explain":1,"explain ":1,"external":1,"failure":1,"far":1,"figuring":1,"formula":1,"functionality":1,"fundamental":1,"get":1,"give":1,"good":1,"google":1,"got":1,"handful":1,"handle":1,"has ":1,"having":1,"here":1,"high-quality":1,"higher":1,"human":1,"important":1,"improved":1,"in-source":1,"in-sourced":1,"including ":1,"inclusive":1,"infections":1,"information":1,"internet":1,"invariably":1,"investments":1,"island”":1,"isn’t":1,"issue":1,"items":1,"keep":1,"keeping":1,"large":1,"least":1,"less":1,"level":1,"leverage":1,"leveraged":1,"lip":1,"little":1,"located":1,"lose":1,"love":1,"made":1,"magic":1,"malware":1,"man":1,"manually":1,"many businesses":1,"marketing":1,"material":1,"maybe":1,"miss":1,"monitor":1,"most/many":1,"msp":1,"msps":1,"much":1,"networks":1,"no":1,"objective":1,"often":1,"once":1,"operating":1,"optimally":1,"organization":1,"organizations":1,"other":1,"our clients":1,"out-sourced":1,"outages":1,"outcome":1,"outsource":1,"oversight":1,"particular":1,"partner":1,"partner’s":1,"pay":1,"pc":1,"perform":1,"philosophies":1,"philosophy":1,"picture":1,"plan":1,"pool":1,"power":1,"price":1,"primary":1,"proactive":1,"process":1,"proof":1,"proper":1,"properly":1,"providing":1,"questions":1,"rarely":1,"reacting":1,"reason":1,"references":1,"reliability":1,"remote":1,"resource":1,"resources":1,"restore":1,"results":1,"roles":1,"root":1,"safe":1,"sale”":1,"saying":1,"scale":1,"scenarios":1,"scope":1,"secure":1,"security":1,"see":1,"selling":1,"short":1,"situation":1,"so":1,"solutions":1,"sooner":1,"sourcing”":1,"spend":1,"staff is":1,"standpoint":1,"still":1,"subject":1,"such":1,"supported":1,"talent":1,"tech":1,"technical":1,"than":1,"their":1,"them":1,"then":1,"things":1,"though":1,"time-consuming":1,"towards":1,"training":1,"true":1,"under":1,"understanding":1,"unique":1,"us":1,"used":1,"value":1,"vendor":1,"via":1,"visualize":1,"want":1,"well":1,"we’ve":1,"where":1,"whether":1,"which":1,"world":1,"worth":1,"worthwhile":1,"yourself…":1,"you’re":1," how":1," service":1," you":1,"‘break-fix’":1,"“no":1,"“smart":1,"“the":1,"“will":1},"readingTime":"~ 5 minutes","settings":{"includeSpace":false,"includeHTML":false}}},{}]},"listing":{"title":"Should I Insource or Outsource my IT?","subTitle":"","excerpt":"The right IT mix—internal staff, outsourced support, or both—depends on scale, needs, and risk tolerance.","mediaAsset":{"assetType":{"id":"DVZlqatASqmX4cDiuPWzew","image":{"responsiveImage":{"src":"https://www.datocms-assets.com/147131/1745867576-istock-1435220822.jpg","srcSet":"https://www.datocms-assets.com/147131/1745867576-istock-1435220822.jpg?dpr=0.25 530w,https://www.datocms-assets.com/147131/1745867576-istock-1435220822.jpg?dpr=0.5 1060w,https://www.datocms-assets.com/147131/1745867576-istock-1435220822.jpg?dpr=0.75 1590w,https://www.datocms-assets.com/147131/1745867576-istock-1435220822.jpg 2121w","width":2121,"height":1414,"alt":"IT admin working on multiple computers","title":null,"base64":"data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wCEAAoHBwgHBgoICAgLFQoLDhgQDRgVDhYXFhUaFxcfGBYmIhUaHysvHR0oHRUWJDUlKC0vMjIyHSI4PTcwPCsxMi8BCgsLDg0OHA4NHDsdFhwvLy8vLy87Oy8vLy8vLy8vLy8vLy87Ly8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vL//AABEIABAAGAMBIgACEQEDEQH/xAAZAAABBQAAAAAAAAAAAAAAAAAEAAIDBQf/xAAfEAABBAEFAQAAAAAAAAAAAAABAAIEBQMREhUhQRP/xAAVAQEBAAAAAAAAAAAAAAAAAAADAv/EABcRAQEBAQAAAAAAAAAAAAAAAAEAIRH/2gAMAwEAAhEDEQA/AJTImEhwT5c2b88fSoa+8zZI+5yO5o5WtDh6rAoVtIppcvPTNG3vRJCUVuG1rRp4kkyB7f/Z","sizes":"(max-width: 2121px) 100vw, 2121px"},"focalPoint":{"x":0.5,"y":0.5}}}}}},{"id":"XBxR_oHFTVWUJ3WxmTCMig","title":"Becoming a Human Firewall","slugPrefix":"resources/","slug":"becoming-a-human-firewall","_modelApiKey":"resource","_firstPublishedAt":"2018-11-20T21:24:04-05:00","_createdAt":"2025-08-02T21:21:29-04:00","tags":[{"id":"HB24S9itST6l0PPTPfGtdQ","slug":"security","tag":"Security"}],"pageTemplate":{"pageContentSections":[{"_modelApiKey":"section_content_basic","id":"ThKqRDqKSzG-JpQNuzbUzA","contentWordCounter":{"words":584,"characters":3182,"specialCharacters":78,"sentences":47,"paragraphs":30,"commonWords":{"to":30,"the":24,"a":18,"and":18,"of":14,"security":12,"that":12,"your":11,"employees":10,"human":10,"is":9,"information":8,"in":6,"or":6,"access":5,"phishing":5,"sensitive":5,"them":5,"training":5,"as":4,"by":4,"data":4,"from":4,"scams":4,"with":4,"are":3,"but":3,"can":3,"defense":3,"error":3,"firewall":3,"firm":3,"for":3,"how":3,"if":3,"it’s":3,"know":3,"most":3,"organization":3,"right":3,"their":3,"threats":3,"verify":3,"an":2,"authorized":2,"before":2,"business":2,"clicking":2,"compromise":2,"could":2,"creating":2,"effective":2,"email":2,"engineers":2,"help":2,"key":2,"line":2,"make":2,"means":2,"minimize":2,"more":2,"need":2,"off":2,"on":2,"ongoing":2,"people":2,"policies":2,"possible":2,"providing":2,"recognize":2,"request":2,"risk":2,"should":2,"social":2,"software":2,"spot":2,"strong":2,"threat":2,"tools":2,"ways":2,"we":2,"who":2,"77%":1,"able":1,"act":1,"action":1,"added":1,"addresses":1,"all":1,"always":1,"anyone":1,"appropriate":1,"aren’t":1,"at":1,"attacker":1,"attackers’":1,"attempt":1,"avoid":1,"awareness":1,"bad":1,"basics":1,"be":1,"best":1,"between":1,"big":1,"biggest":1,"buffer":1,"building":1,"call":1,"caller":1,"cards":1,"certain":1,"checking":1,"clean":1,"clients":1,"cluttered":1,"colleague":1,"combines":1,"common":1,"company":1,"confidential":1,"confirm":1,"constantly":1,"controlling":1,"correct":1,"create":1,"critical":1,"culture":1,"desk":1,"digital":1,"double-checking":1,"down":1,"educating":1,"element":1,"element ":1,"elicits":1,"emails":1,"employee":1,"equipping":1,"escalating":1,"especially":1,"exploit":1,"file":1,"firewalls":1,"firewall—as":1,"firewall”":1,"firm’s":1,"forge":1,"frequent":1,"frustrating":1,"gain":1,"gaining":1,"gather":1,"genuine":1,"get":1,"goal":1,"good":1,"guys":1,"hacker":1,"hackers":1,"handle":1,"hardware":1,"has":1,"have":1,"heighten":1,"id":1,"identities":1,"identity":1,"ignore":1,"impersonating":1,"implementing":1,"include":1,"individual":1,"individuals":1,"inevitable":1,"influences":1,"instead":1,"into":1,"it":1,"it’s easier":1,"just":1,"knowing":1,"layer":1,"legitimate":1,"less":1,"like":1,"link":1,"links":1,"looking":1,"lose":1,"making":1,"malicious":1,"manage":1,"management":1,"managing":1,"materials":1,"may":1,"measures":1,"messy":1,"might":1,"networks":1,"new":1,"one":1,"other":1,"overall":1,"papers":1,"password":1,"phone":1,"policies—because":1,"pose":1,"potential":1,"practical":1,"prepared":1,"present":1,"prince.”":1,"procedures":1,"process":1,"processes":1,"professionals":1,"protect":1,"provide":1,"question":1,"quick":1,"receive":1,"recent":1,"regular":1,"reinforcing":1,"remains":1,"reminders":1,"reports":1,"requesting":1,"requires":1,"responsible":1,"restricted":1,"risks":1,"same":1,"saving":1,"seems":1,"sense":1,"shouldn’t":1,"shutting":1,"simulations":1,"situational":1,"society":1,"something":1,"sophos":1,"spaces":1,"sponsored":1,"stand":1,"stop":1,"strengthen":1,"success":1,"such":1,"supervisor":1,"sure":1,"survey":1,"technology":1,"telephone":1,"these":1,"they":1,"they’re":1,"the ":1,"this":1,"through":1,"time":1,"today’s":1,"top":1,"total":1,"train":1,"transform":1,"trick":1,"true":1,"try":1,"typically":1,"use":1,"used":1,"users":1,"uses":1,"valuable":1,"verifying":1,"via":1,"vishing":1,"vulnerabilities":1,"vulnerable":1,"way":1,"well-trained":1,"when":1,"whether":1,"while":1,"will":1,"workspaces":1,"you":1," ":1," said":1,"“human":1,"“nigerian":1},"readingTime":"~ 3 minutes","settings":{"includeSpace":false,"includeHTML":false}}},{}]},"listing":{"title":"Becoming a Human Firewall","subTitle":"","excerpt":"Employees are often the weakest link in your security, but the right training can turn them into a strong mode of defense.","mediaAsset":{"assetType":{"id":"Q7j45tl4SV2mROuR8krskw","image":{"responsiveImage":{"src":"https://www.datocms-assets.com/147131/1755101185-istock-1353565724.jpg","srcSet":"https://www.datocms-assets.com/147131/1755101185-istock-1353565724.jpg?dpr=0.25 530w,https://www.datocms-assets.com/147131/1755101185-istock-1353565724.jpg?dpr=0.5 1060w,https://www.datocms-assets.com/147131/1755101185-istock-1353565724.jpg?dpr=0.75 1590w,https://www.datocms-assets.com/147131/1755101185-istock-1353565724.jpg 2121w","width":2121,"height":1414,"alt":"human user graphic","title":null,"base64":"data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wCEAAoHBwgHBgoICAgLDRAUDhgQDRYNDhENFg0YFxYZGCIfIiEaHysjHR0oHRUWJDUlKC0vMjIyGSI4PTcwPCsxMi8BCgsLDg0OHA0OEC8cFhw7Ly8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vL//AABEIABAAGAMBIgACEQEDEQH/xAAXAAADAQAAAAAAAAAAAAAAAAAAAwUE/8QAGxAAAgIDAQAAAAAAAAAAAAAAAQMABAIREyH/xAAWAQEBAQAAAAAAAAAAAAAAAAAGBAL/xAAXEQADAQAAAAAAAAAAAAAAAAAAASEC/9oADAMBAAIRAxEAPwC3QZmKujH+hBJmKng3lqMtMYtEQB1qku5jskwirLjz2YTRTlQ//9k=","sizes":"(max-width: 2121px) 100vw, 2121px"},"focalPoint":{"x":0.5,"y":0.5}}}}}},{"id":"MQKmCenwSFSLqTI5gCyhLw","title":"What Does Data Encryption Mean and What Does It Do?","slugPrefix":"resources/","slug":"what-does-data-encryption-mean-and-what-does-it-do","_modelApiKey":"resource","_firstPublishedAt":"2020-07-24T21:21:18-04:00","_createdAt":"2025-08-02T21:17:41-04:00","tags":[{"id":"HB24S9itST6l0PPTPfGtdQ","slug":"security","tag":"Security"}],"pageTemplate":{"pageContentSections":[{"_modelApiKey":"section_content_basic","id":"CWpODGy2T_mqE5a-S2LYqg","contentWordCounter":{"words":559,"characters":2861,"specialCharacters":78,"sentences":44,"paragraphs":32,"commonWords":{"365":1,"the":25,"encryption":21,"to":16,"your":15,"is":13,"and":12,"you":12,"a":11,"in":10,"data":8,"information":8,"are":7,"security":7,"that":7,"at":6,"encrypted":6,"if":6,"key":6,"of":6,"be":5,"it":5,"this":5,"transit":5,"with":5,"as":4,"by":4,"have":4,"rest":4,"used":4,"being":3,"but":3,"for":3,"keep":3,"laptop":3,"many":3,"may":3,"means":3,"or":3,"password":3,"secure":3,"sensitive":3,"there":3,"they":3,"website":3,"when":3,"will":3,"without":3,"access":2,"an":2,"between":2,"both":2,"checklist":2,"common":2,"default":2,"device":2,"devices":2,"ensure":2,"essential":2,"generally":2,"hard":2,"how":2,"just":2,"keeping":2,"log":2,"managed":2,"mobile":2,"most":2,"networks":2,"not":2,"on":2,"part":2,"phones":2,"private":2,"program":2,"risks":2,"scrambling":2,"see":2,"them":2,"these":2,"they’re":2,"uses":2,"we":2,"why":2,"won’t":2,"worthless":2,"ability":1,"about":1,"account":1,"actively":1,"actual":1,"actually":1,"address":1,"addressing":1,"all":1,"allowing":1,"already":1,"also":1,"appear":1,"ask":1,"assess":1,"automatically":1,"bank":1,"bank’s":1,"because":1,"before":1,"behind":1,"best":1,"bitlocker":1,"browser":1,"businesses":1,"can":1,"checklists":1,"client":1,"code":1,"compliance":1,"confidential":1,"confirm":1,"cracks":1,"current":1,"dangerous":1,"dedicated":1,"device—so":1,"drive":1,"drives":1,"each":1,"easily":1,"email":1,"enabled":1,"encrypt":1,"encrypted, but":1,"essentially":1,"examples":1,"exposing":1,"exposure":1,"falls":1,"flag":1,"from":1,"gaps":1,"get":1,"go":1,"good":1,"haven’t":1,"help":1,"holding":1,"http://":1,"https://":1,"hygiene":1,"include":1,"indicate":1,"indicates":1,"instead":1,"internet":1,"into":1,"involves":1,"isn’t":1,"issues":1,"items":1,"it’s":1,"know":1,"knows":1,"laptops":1,"least":1,"legal":1,"lock":1,"looks":1,"major":1,"make":1,"manage":1,"managing":1,"matters":1,"meaningless":1,"meeting":1,"microsoft":1,"modern":1,"moves":1,"moving":1,"native":1,"normal":1,"nothing":1,"office":1,"one":1,"one-time":1,"ones":1,"ongoing":1,"over":1,"overall":1,"parts":1,"perform":1,"phone":1,"pin":1,"places":1,"possible":1,"practices":1,"prevents":1,"proactive":1,"proper":1,"protect":1,"provider":1,"readable":1,"recommend":1,"red":1,"regular":1,"required":1,"review":1,"reviews":1,"safe":1,"saved":1,"scenes":1,"scramble":1,"settings":1,"setup":1,"should":1,"sign":1,"site":1,"so":1,"someone":1,"something":1,"special":1,"start":1,"steal":1,"stolen":1,"stolen—creating":1,"storage":1,"strictly":1,"strong":1,"technology":1,"tell":1,"that’s":1,"thief":1,"those":1,"threats":1,"through":1,"top":1,"topics":1,"total":1,"transmitted":1,"treated":1,"trust":1,"two":1,"type":1,"types":1,"unless":1,"unlocks":1,"unreadable":1,"up":1,"url":1,"use":1,"using":1,"usually":1,"verify":1,"very":1,"via":1,"vs":1,"web":1,"well":1,"where":1,"which":1,"working":1,"writes":1,"year":1,"zeros":1," if":1,"“hidden.”":1,"“s”":1},"readingTime":"~ 3 minutes","settings":{"includeSpace":false,"includeHTML":false}}},{}]},"listing":{"title":"What Does Data Encryption Mean and What Does It Do? ","subTitle":"","excerpt":"Encryption in transit and at rest safeguards sensitive data against theft, loss, or unauthorized access.","mediaAsset":{"assetType":{"id":"Tnp__VfaS2ubC5k5DDkGtA","image":{"responsiveImage":{"src":"https://www.datocms-assets.com/147131/1755099771-istock-1346223165.jpg","srcSet":"https://www.datocms-assets.com/147131/1755099771-istock-1346223165.jpg?dpr=0.25 577w,https://www.datocms-assets.com/147131/1755099771-istock-1346223165.jpg?dpr=0.5 1154w,https://www.datocms-assets.com/147131/1755099771-istock-1346223165.jpg?dpr=0.75 1731w,https://www.datocms-assets.com/147131/1755099771-istock-1346223165.jpg 2309w","width":2309,"height":1298,"alt":"data encryption graphic","title":null,"base64":"data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wCEAAoHBwgRDQgIBwcNBgYHDg0IDAYGBxENFhEOFxUZGBYTFhUaHysjGh0oHRUWJDUlKC0vMjIyGSI4PTcwPCsxMi8BCgsLDg0OHA0OHDsdFh07Oy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vL//AABEIAA4AGAMBIgACEQEDEQH/xAAYAAACAwAAAAAAAAAAAAAAAAAAAQIDBv/EABUQAQEAAAAAAAAAAAAAAAAAAAAB/8QAFgEBAQEAAAAAAAAAAAAAAAAABQQD/8QAGhEAAgIDAAAAAAAAAAAAAAAAAAECEgMRIv/aAAwDAQACEQMRAD8Az5U4F+0gLqxXYErAyc0MY1Kp/9k=","sizes":"(max-width: 2309px) 100vw, 2309px"},"focalPoint":{"x":0.5,"y":0.5}}}}}},{"id":"cefUtlQ9RVmhudRSunaMjQ","title":"What is Browser Hijacking?","slugPrefix":"resources/","slug":"what-is-browser-hijacking","_modelApiKey":"resource","_firstPublishedAt":"2021-09-20T21:16:45-04:00","_createdAt":"2025-08-02T21:10:32-04:00","tags":[{"id":"HB24S9itST6l0PPTPfGtdQ","slug":"security","tag":"Security"}],"pageTemplate":{"pageContentSections":[{"_modelApiKey":"section_content_basic","id":"BCEPVpE4TXuRGSfEYpRRwQ","contentWordCounter":{"words":368,"characters":1968,"specialCharacters":45,"sentences":28,"paragraphs":19,"commonWords":{"browser":17,"your":14,"to":13,"a":10,"and":8,"or":8,"the":8,"hijacking":7,"be":6,"you":6,"of":5,"can":4,"is":4,"on":4,"software":4,"ads":3,"been":3,"clicking":3,"from":3,"have":3,"hijacked":3,"how":3,"in":3,"it":3,"not":3,"tools":3,"when":3,"without":3,"access":2,"also":2,"are":2,"as":2,"changes":2,"could":2,"data":2,"downloading":2,"emails":2,"extensions":2,"help":2,"include":2,"installing":2,"its":2,"link":2,"malware":2,"may":2,"pop-up":2,"program":2,"search":2,"security":2,"seem":2,"suspicious":2,"system":2,"than":2,"web":2,"while":2,"with":2,"100%":1,"accidentally":1,"against":1,"always":1,"anti-malware":1,"antivirus":1,"any":1,"appear":1,"at":1,"attachments":1,"attacks":1,"authenticity":1,"basic":1,"being":1,"best":1,"beyond":1,"big":1,"bombarded":1,"both":1,"businesses":1,"capture":1,"cautious":1,"click":1,"common":1,"company":1,"compromised":1,"computer":1,"consent":1,"consequences":1,"control":1,"credentials":1,"cybercriminals":1,"cybersecurity":1,"default":1,"different":1,"does":1,"download":1,"dozen":1,"easier":1,"employee":1,"engine":1,"enter":1,"entry":1,"ever":1,"expensive":1,"files":1,"firewalls":1,"follow":1,"for":1,"free":1,"gain":1,"gateway":1,"good":1,"google":1,"habits":1,"has":1,"hijacker":1,"homepage":1,"if":1,"infected":1,"innocuous":1,"internet":1,"just":1,"launch":1,"less":1,"like":1,"links":1,"login":1,"looked":1,"malicious":1,"managed":1,"might":1,"more":1,"much":1,"multiple":1,"need":1,"network":1,"networks":1,"new":1,"noticed":1,"nuisance":1,"often":1,"one":1,"only":1,"opened":1,"opening":1,"opens":1,"out":1,"performed":1,"permission":1,"point":1,"pop":1,"practices":1,"prevention":1,"proactive":1,"protect":1,"protecting":1,"publishers":1,"recovery":1,"redirected":1,"reduce":1,"remember":1,"requires":1,"restrict":1,"risk":1,"risks":1,"safeguard":1,"scanning":1,"sensitive":1,"serious":1,"settings":1,"several":1,"signs":1,"sites":1,"smart":1,"sources":1,"stay":1,"steal":1,"strange":1,"strong":1,"such":1,"suddenly":1,"sure":1,"tabs":1,"takes":1,"tell":1,"that":1,"them":1,"these":1,"they":1,"this":1,"threat":1,"through":1,"toolbars":1,"total":1,"training—because":1,"turn":1,"unexpectedly":1,"unknown":1,"unless":1,"unrelated":1,"unverified":1,"up":1,"updates":1,"url":1,"victim":1,"vigilant":1,"warning":1,"way":1,"ways":1,"we":1,"wider":1,"windows":1,"you’ve":1},"readingTime":"~ 2 minutes","settings":{"includeSpace":false,"includeHTML":false}}},{}]},"listing":{"title":"What is Browser Hijacking?","subTitle":"","excerpt":"Malware-driven browser hijacking redirects searches, floods users with ads, and exposes private information.","mediaAsset":{"assetType":{"id":"fO478uSnQKSRdBVxzDC9pg","image":{"responsiveImage":{"src":"https://www.datocms-assets.com/147131/1755098302-istock-2219198263.jpg","srcSet":"https://www.datocms-assets.com/147131/1755098302-istock-2219198263.jpg?dpr=0.25 530w,https://www.datocms-assets.com/147131/1755098302-istock-2219198263.jpg?dpr=0.5 1060w,https://www.datocms-assets.com/147131/1755098302-istock-2219198263.jpg?dpr=0.75 1590w,https://www.datocms-assets.com/147131/1755098302-istock-2219198263.jpg 2121w","width":2121,"height":1414,"alt":"browser hijacking graphic","title":null,"base64":"data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wCEAAoHBwgHBgoICAgLFhYLDhgQGA0XDhgVFh0VFxUZGCIVKhUdKSsjHR0oHRUWJDUlKC0vMjIyHSU4PTcwPCsxMi8BCgsLDg0OHA8QHDscIh0vLy87Oy87Oy8vOzsvLy8vLy8vOy87Oy87Ly8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vL//AABEIABAAGAMBIgACEQEDEQH/xAAYAAACAwAAAAAAAAAAAAAAAAADBQACB//EABwQAAIDAAMBAAAAAAAAAAAAAAEDAAIEBRESMf/EABcBAAMBAAAAAAAAAAAAAAAAAAIDBAH/xAAZEQACAwEAAAAAAAAAAAAAAAAAEQECAxL/2gAMAwEAAhEDEQA/ANNxZvSugIW+dq028iUycila4Qc0ixNeo6eibKc0IMltS99j5P2SNDvRVxsKiSFDMtfNn//Z","sizes":"(max-width: 2121px) 100vw, 2121px"},"focalPoint":{"x":0.5,"y":0.5}}}}}},{"id":"duojjyZmR5yxLO5qJqQAKA","title":"Important Microsoft Updates to Stop Bad Actors","slugPrefix":"resources/","slug":"important-microsoft-updates-to-stop-bad-actors","_modelApiKey":"resource","_firstPublishedAt":"2024-01-24T18:35:40-05:00","_createdAt":"2025-08-02T18:35:36-04:00","tags":[{"id":"BCBzyGYbRoSggzzaliDhyg","slug":"ask-the-it-expert","tag":"Ask the IT Expert"}],"pageTemplate":{"pageContentSections":[{"_modelApiKey":"section_content_basic","id":"Ezz5_Za9QvesgwSCZJvvDw","contentWordCounter":{"words":442,"characters":2451,"specialCharacters":57,"sentences":34,"paragraphs":25,"commonWords":{"365":6,"2023":1,"to":19,"and":14,"microsoft":11,"the":8,"access":7,"for":7,"in":7,"of":7,"a":6,"as":6,"entra":6,"id":6,"our":6,"we":6,"has":5,"is":5,"it":5,"security":5,"p2":4,"risk":4,"your":4,"clients":3,"defender":3,"email":3,"features":3,"networks":3,"office":3,"p1":3,"protection":3,"subscription":3,"these":3,"total":3,"which":3,"while":3,"accounts":2,"at":2,"attack":2,"azure":2,"be":2,"block":2,"business":2,"can":2,"certain":2,"changes":2,"compromise":2,"defenses":2,"from":2,"how":2,"included":2,"its":2,"licensing":2,"many":2,"microsoft’s":2,"now":2,"one":2,"or":2,"other":2,"premium":2,"rebranded":2,"recommend":2,"requires":2,"so":2,"such":2,"that":2,"this":2,"threat":2,"use":2,"why":2,"with":2,"account":1,"active":1,"actors":1,"ad":1,"added":1,"additional":1,"adopt":1,"advanced":1,"against":1,"ahead":1,"allows":1,"also":1,"among":1,"an":1,"anti-spam":1,"approved":1,"arizona":1,"artificial":1,"attacks":1,"attempt":1,"attempts":1,"august":1,"bad":1,"based":1,"before":1,"built-in":1,"bundles":1,"by":1,"capabilities":1,"choice":1,"client’s":1,"come":1,"common":1,"compelling":1,"competitive":1,"compromised":1,"conditional":1,"confidential":1,"contacts":1,"continually":1,"continue":1,"continuous":1,"continuously":1,"countries":1,"country":1,"decades":1,"defense":1,"developing":1,"development":1,"directory":1,"disruptive":1,"don’t":1,"earlier":1,"effective":1,"efficient":1,"employees":1,"enables":1,"enhanced":1,"ensure":1,"environment":1,"environments":1,"evaluate":1,"evaluation":1,"evolve":1,"evolving":1,"expects":1,"extends":1,"far":1,"few":1,"firm":1,"flag":1,"formerly":1,"forms":1,"gain":1,"given":1,"granting":1,"have":1,"heavily":1,"identity":1,"impersonate":1,"important":1,"improve":1,"improved":1,"improving":1,"including":1,"information":1,"integration":1,"intelligence":1,"internally":1,"introduces":1,"invested":1,"keep":1,"known":1,"landscape":1,"later":1,"less":1,"license":1,"login":1,"logins":1,"logs":1,"m365":1,"make":1,"malicious":1,"manage":1,"manual":1,"meets":1,"members":1,"messages":1,"microsofts":1,"minutes":1,"more":1,"most":1,"must":1,"no":1,"not":1,"number":1,"one-time":1,"only—an":1,"order":1,"organizations":1,"originate":1,"others":1,"overseas":1,"perfect":1,"platform":1,"protections":1,"purchased":1,"recommends":1,"reduce":1,"reflects":1,"regular":1,"remain":1,"remained":1,"research":1,"restrict":1,"review":1,"send":1,"separate":1,"services":1,"shift":1,"side":1,"significantly":1,"situations":1,"solution":1,"stack":1,"standalone":1,"standards":1,"stay":1,"strategies":1,"strategy":1,"strengthening":1,"strengthens":1,"strongly":1,"suspicious":1,"task":1,"team":1,"their":1,"them":1,"then":1,"threats":1,"tools":1,"travel”":1,"types":1,"understanding":1,"upgrades":1,"user":1,"uses":1,"various":1,"vector":1,"versions":1,"were":1,"where":1,"“impossible":1},"readingTime":"~ 2 minutes","settings":{"includeSpace":false,"includeHTML":false}}},{}]},"listing":{"title":"Important Microsoft Updates to Stop Bad Actors","subTitle":"","excerpt":"Staying current with Microsoft security updates helps protect accounts and reduce the risk of disruption.","mediaAsset":{"assetType":{"id":"LVVVqWJdQIuaiJ9PaEApfg","image":{"responsiveImage":{"src":"https://www.datocms-assets.com/147131/1755094656-istock-639646818.jpg","srcSet":"https://www.datocms-assets.com/147131/1755094656-istock-639646818.jpg?dpr=0.25 539w,https://www.datocms-assets.com/147131/1755094656-istock-639646818.jpg?dpr=0.5 1079w,https://www.datocms-assets.com/147131/1755094656-istock-639646818.jpg?dpr=0.75 1619w,https://www.datocms-assets.com/147131/1755094656-istock-639646818.jpg 2159w","width":2159,"height":1388,"alt":"email logo with a lock","title":null,"base64":"data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wCEAAoHBwgHBgoICAgXFQoLDhgQDhUWFRUNFhUkGyQZHSAaIhUaHysjGikoHRUmJTUlKC0vMjIyHSU4PTcwPCsxMi8BCgsLDg0OHA4QEDsoIh07OzU7Lzs7Lzs7NTsvOy8vNS8vLy8vLy8vLy87Ly8vLy8vLy8vLy8vLy8vLy8vLy8vL//AABEIABAAGAMBIgACEQEDEQH/xAAZAAABBQAAAAAAAAAAAAAAAAAFAAECBgf/xAAeEAACAgICAwAAAAAAAAAAAAABBAADAhEFYRMhUf/EABUBAQEAAAAAAAAAAAAAAAAAAAQD/8QAGhEAAgIDAAAAAAAAAAAAAAAAAhEAEgEDIf/aAAwDAQACEQMRAD8AyZGkljRhanijZaTBCjBxaBh2jlBXmR1F6aV7Jm3K+3SV3csPhiknWfO9lZr1uPCngbSotT//2Q==","sizes":"(max-width: 2159px) 100vw, 2159px"},"focalPoint":{"x":0.5,"y":0.5}}}}}}]
Sorry, no results were found
Connect with Our Team
Phoenix-Based IT Support You Can Count On
Keep your business protected, productive, and ready for what’s next. Our Phoenix IT support team provides expert guidance and reliable service every step of the way.
