
The Biggest Hacks of 2021
Have you ever taken the time to consider what would happen if technological systems that you rely on daily were no longer working Think about eve...

Defender for Endpoint P1 & P2 Pricing, Features, and Comparison
Microsoft is taking steps to bring the best cybersecurity features to more businesses One of their flagship products for enterprise cybersecurity De...

Mitigating Cybersecurity Risks of Offboarding Remote Employees
Typically organizations spend a lot of time onboarding new employees to ensure they can access every company resource they need However this same c...

IT Due Diligence for Mergers and Acquisitions
Recent statistics reveal that between July and September 2021, there were over 1,000 mergers and acquisitions (M&A) deals in the technology services sector in the United States. The combined total number of M&A deals from across industries including finance...

10 Top CMMC Assessment Checklist Resources
Intro from Agile IT This is a guest post from John Verry CISO and Managing Partner at PivotPoint SecurityBusinesses that provide products or se...

CMMC 2.0 Announced - Changes From CMMC 1.0 to CMMC 2.0
CMMC 20 has been released Early Thursday morning November 4th a proposed rule was accidentally published on the Federal Register titled Cyberse...