September 08, 2023
Cloud Solution Provider Testimonial: A.I.S. Inc.
A.I.S., Inc. (AIS), a leading marine science services firm, helps ensure sustainable use of marine resources in U.S. coastal communities through environmental data collection, data management, and compliance monitoring. The AIS name reflects the company’s core values of Accuracy, Integrity, and Service. AIS wanted a partner who shares those values and could provide a smooth transition to Microsoft Azure […]
Read more
October 31, 2022
Cloud Threats & Mitigation Techniques
In honor of National Cybersecurity Awareness month, Sayers will be releasing a series of short videos focused on various cybersecurity topics. In this episode, I’d like to talk to you about cloud threats and mitigation techniques. Let’s face it we all know cloud adoption and migration on the rise with benefits to an organization including […]
Read more
October 27, 2022
What do Disaster Recovery and Business Continuity have to do with Cybersecurity?
In honor of National Cybersecurity Awareness month, Sayers will be releasing a series of short videos focused on various cybersecurity topics. In this episode, I’d like to provide you with some quick information about Disaster Recovery and Business Continuity. With that in mind, you may be asking yourself: “What do Disaster Recovery and Business Continuity […]
Read more
October 18, 2022
Responding to a Cyber Attack
In honor of National Cybersecurity Awareness Month, Sayers will be releasing a series of short videos focused on various cybersecurity topics. In this episode, I’d like to provide you with some insight on how to RESPOND to a Cyber Attack. It is almost inevitable that your organization will be affected (at some level or another) […]
Read more
October 11, 2022
5 Tips to Combat Phishing Attacks
In honor of National Cybersecurity Awareness month, Sayers will be releasing a series of short videos focused on various cybersecurity topics. In this episode, I’d like to provide you with some steps to identify and combat phishing attacks. When a social engineering attack occurs, the attacker uses human interaction (typically via social skills) to obtain or compromise […]
Read more
October 05, 2022
Identity & Access Management: The 3 Pillars of IAM
In honor of National Cybersecurity Awareness month, Sayers will be releasing a series of short videos focused on various cybersecurity topics. In this episode, I’d like to provide you with an overview of Enterprise Identity and Access Management (IAM). Identity and Access Management, often referred to as IAM, are the structures and processes within an […]
Read more