Learn

RSA 2026, Cisco’s announcement treated AI agents as a distinct attack surface for the first time

RSA 2026, Cisco's announcement treated AI agents as a distinct attack surface for the first time. That framing is correct. What remains to be seen is whether the architecture behind it is equal to the problem — or whether Zero Trust is simply being stretched to cover a threat landscape it was never designed for? Which is it?

It’s the architecture being equal to the problem — a purposeful evolution of Zero Trust, not a stretch.

Modern password tips based on NIST guidelines

Passwords are an inherently flawed security measure in an era of constant phishing attacks and massive data leaks. This guide breaks down the latest recommendations from the National Institute of Standards and Technology (NIST) and shows how to improve security with longer passwords, smarter tools, and modern authentication methods.

Hello Glasswing: What this Means for Cisco SMBs

As a cybersecurity professional with more than 15 years defending networks of countless small and medium-sized businesses—I’ve watched threat landscapes evolve from script-kiddie exploits to nation-state campaigns. The recent announcement of Anthropic’s Project Glasswing marks one of the most significant inflection points I’ve seen.

What if I could continuously focus my attention on high-value thoughts?

As your trusted managed services partner in this space, I'm excited to break down https://wisprflow.ai/r?DONALD618 in a way that directly connects to the AI adoption challenges we tackle every day with small and medium businesses.

What is Wispr Flow?

Wispr Flow (often just called Flow) is an AI-powered voice dictation tool that lets you speak naturally and instantly turn your words into clear, polished, well-formatted text—in any app or text field on your devices.

6 Simple ways to recover lost Excel files

Your Microsoft Excel spreadsheets are likely the lifeblood of your small business. Whether it’s your monthly budget, an upcoming payroll sheet, or your entire inventory list, seeing hours of hard work vanish in an instant is terrifying. Before you start retyping everything from scratch, take a deep breath.

What are the CIS controls are required for SOC 2 compliance

SOC 2 compliance does not have a strict list of "required" CIS Controls. SOC 2 is based on the AICPA Trust Services Criteria (TSC) — primarily the Security criterion (which is mandatory), with optional additions like Availability, Confidentiality, Processing Integrity, or Privacy depending on your clients' needs.

How to achieve SOC 2 compliance?

SOC 2 compliance demonstrates that your organization has strong controls in place to protect customer data—focusing on security, availability, processing integrity, confidentiality, and privacy (known as the Trust Services Criteria or TSC). For smaller businesses like many of our clients, it's often a key requirement to win enterprise contracts, meet cyber insurance needs, or build trust with partners.