Cyber threat actors know that s we approach the holidays our lives get considerably busier, which means less focus on business tasks and communications. They use this lull in focus, planning, and policy reviews to their advantage. Thought leaders in the cybersecurity industry have been warning us of this every year at this time, but […]
About Kelsey Sarff
This author has yet to write their bio.
Meanwhile lets just say that we are proud Kelsey Sarff contributed a whooping 46 entries.
Digital Trust is a make or break for your business In today’s digital world where most business is done online and data breaches are becoming more common, digital trust has become a valuable commodity for those companies that earn it. This phenomenon – where trust has become the currency of which businesses differentiate themselves from […]
One of the challenges in designing and implementing a cybersecurity program is reconciling the somewhat disparate goals of establishing and maintaining secure systems while preserving end user access and efficiency. You can implement the most secure system in the world, but if your end users can’t access your systems or access them efficiently, it’s all […]
We all enjoy using the internet, but the internet monitors everything we do. Everyone needs to take safety precautions to protect data and information. Over 90% of our daily activities take place online. Think about what would happen if the internet disappeared for a single day. No doubt, businesses, and individuals will suffer significant losses. […]
In today’s day and age there are 1000’s of buzz words and acronyms in the IT world, “Did you update the MX DNS record so that the SMTP server can relay correctly?”, “Is your next-gen Anti-Virus product EDR, MDR, or XDR?”, “How does your CDN mitigate DDoS attacks?”. Riveting conversation for the everyday person, right? […]
Have you heard about the Federal Trade Commission (FTC) recent amendments to its Safeguards Rule, which require dealers to undertake a series of procedural, technical and contractual steps? The Rule’s requirements must all be completed by December 9, 2022.
Join founder Chris Taylor and Sales Director Ann Mauer as they sit down to discuss the question “How Do I Budget for IT?”. They dive into the why, what, and how of SMB IT budgeting. Have questions you’d like to hear discussed? Send an email to firstname.lastname@example.org or head over to www.cit-net.com/podcast. Have a question […]
This week we chat with Todd, Nate, and Ashley about Zero-Trust and what it is. They’ve got castle moat and decorative hand towel analogies and so much more. Stay tuned for Part II of how to implement coming soon. Have questions you’d like to hear discussed? Send an email to email@example.com or head over to […]
Myths include: This week Tara sat down with Todd and Scott to chat more about the Maturity Model (and their favorite vinyl). Listen in to learn more about: How do you define the Maturity Model? Who should consider Maturity Models? Is there more than 1 application for the MM? How does this apply to technology? […]
In this week’s episode, Kyle and Alex sit down to chat about the Myths of the MSP (Managed Service Provider). Myths include: A MSP is there to replace your IT Staff Once you sign up all your problems will go away Only people without IT staff need MSPs & more! Have a question for Kyle […]
We Put People First
We are CIT – a people-first I.T. company that cares about how you use technology, not just the technology itself. Discover how we’re different.