Author: Paul Hugenberg, III

Events
2022 Cybersecurity Conference
By completing the form below you will be able to access the following presentations: Security Challenges & Incident Response | Tyler Hudak, TrustedSec Ransomware Negotiation | Jarman Smith, Brouse McDowell Cybersecurity Insurance | Mercy Komar, L. Calvin Jones CMMC 2.0 | Matthew Travis, CMMC-AB Cyber Hygiene | Dr. Loren Wagner, Centracomm CMMC Panel | Ty … Continued

Video
Cyber Chat | Cloud Resilience
Check out the new Cyber Chat Video with Tim Golden about Cloud Resiliency and how to utilize it to help your company. Expect the unexpected.

Blog
Concern About Cyber Threats Heightened by Russian Invasion
Russia’s invasion of Ukraine has involved comprehensive cybersecurity attacks, both military in origin as well as activist oriented.

Article
Data Security and Backup Options Essential to Selecting the Right Cloud-based Platform
ess is considering new options for cloud services, you are likely looking at Microsoft 365, the cloud-based platform for the ubiquitous Microsoft Office Suite.

Events
Grand Opening! Downtown Columbus Office
As we seek to better serve the Franklin County business community, communities throughout Ohio, and nationwide. Rea & Associates will serve clients from the heart of Columbus in the downtown community at 500 S. Front St. Suite 980. Moving to our new downtown Columbus location provides our team with the space necessary to serve you … Continued
Oct 5, 2021

Podcast
Episode 302: Cybersecurity Awareness Month – Protecting Your Business
Cybersecurity expert at Rea, Ty Whittenburg, joins us today to discuss the importance of cybersecurity and how it can help protect your business.

Blog
Could Your School Survive A Data Breach?
Could your school survive a data breach? What you need to know to keep your school district safe.

Blog
Are You Certified?
Currently, over 300,000 companies conduct business with the U.S. Department of Defense (DoD). If yours is one of them, you need to know about the Cybersecurity Maturity Model Certification (CMMC).

Events
2021 Ohio CMMC Summit
Still not clear when it comes to CMMC? This is your chance to learn from all the right people!

Blog
Is The PrintNightmare Over? Are You Safe?
Here's how to find out if your system has the correct Microsoft Patch installed to protect you from PrintNightmware.

Blog
Rea Dental Client Uncovers Cybersecurity Risks After Risk Assessment
Yes, when it comes to cybersecurity, what you don't know CAN hurt you.

Blog
Cybersecurity: All The Things You Should Know
Wondering if your business is at risk of a cyberattack? Look to the statistics ... or, this article.

Blog
New Windows Vulnerability Is A Nightmare For Businesses
Read on to gain insight into the new PrintNightmare vulnerability.
Jun 22, 2021

Podcast
Episode 288: Is Your Business Putting National Security At Risk?
Are you protecting your company's data ... or are you currently a national security threat?

Blog
Rea and Etactics Partner for Security Wars, A Webinar Series About CMMC
Discover Security Wars … a special FREE webinar series all about CMMC.

Blog
Understanding The Important Role IT Security Plays In Your Dental Practice
What are you doing to protect your patient's data and your medical practice?

Events
Are You Managing Your Cybersecurity Risk Exposure?
If your company became the newest victim of a cyber attack, would you be able to recover?

Blog
What Could A Cybercriminal Do To Your Dental Practice?
Your dental practice could be one click away from disaster. Learn how to protect it.

Blog
Security Wars: An Epic Three-Part CMMC Webinar Series
Yes ... let the understanding of your business's new responsibilities under the DoD's Cybersecurity Maturity Model Certification flow through you ...

Events
Security Wars | Culture Strikes Back
Join Rea & Associates and Etacts as we celebrate the Return of the Process during part three of our three-part Security Wars webinar series.

Events
Security Wars | Return Of The Process
Join Rea & Associates and Etacts as we celebrate the Return of the Process during part two of our three-part Security Wars webinar series.

Events
Security Wars | A New Goal: CMMC
Join Rea & Associates and Etactics for an adventure through the Cybersecurity Maturity Model Certification in part one of our three-part Security Wars webinar series.

Blog
Are There Holes In Your Data Security Infrastructure?
Do you know what your IT department does to keep your company's data safe? We're offering a look behind the curtain.

Blog
Perspectives: What Does The IT Department Do?
Check out this list to find out if you really know what your IT department does.

Events
Understanding SOC 2: A Guide For MSPs
What do you know about SOC 2 and its impact on your organization?

Blog
Transforming Through Technology
Find out how we're leveraging technology to create efficiencies and capacity at Rea!

Blog
Data Breach Reported By Ubiquiti
Does your company utilize Ubiquiti devices? Don't wait. Take these data security measures now to protect your organization from hackers.

Blog
‘Ink Is Cheap. Legal Defense Is Expensive’
Are your business contracts putting you at risk? What you don't know will surprise you.

Blog
Protect Your Business From COVID-19 Cyber Attacks In 3 Steps
Free Resources For Business Owners Promote Greater Cyber Security And Data Protection.

Events
Shifting The Business Infrastructure: Cybersecurity In A COVID-19 World
Register for this free webinar to learn about the workplace of the future and the shift to a normalized telework infrastructure.

Blog
One Wrong Click Can Spell Danger
The digital threat is real and not only is it catastrophic to the larger businesses, smaller companies are paying the price. Read on to learn more.

Events
What Is Life After Coronavirus? Cyber Risk & Telecommuting
Cybersecurity and data protection experts talk about the cyber risks associated with increased telecommuting as a result of the COVID-19 crisis.

Blog
SHIELD Act Designed To Protect Consumer Privacy
Businesses To Comply With Cybersecurity Implementations as SHIELD Act Takes Effect March 21, 2020 Time is ticking for new and improved cybersecurity safeguards for businesses as the SHIELD Act’s data security deadlines take effect on March 21, 2020. New York’s “Stop Hacks and Improve Electronic Data Security Act” (SHIELD Act), N.Y. Gen Bus. Law§ 899-bb … Continued

Blog
Passwords: Turns Out We’ve Been Doing It Wrong This Whole Time
Report reveals that we've been creating and managing our passwords all wrong.

Blog
The Best Thing Since The Internet?
Is blockchain and cryptocurrency the way of the future? You be the judge.

Blog
Payday Problems: Cyber-Criminals Steal Payroll Funds From Atlanta Public Schools
Cyber-attacks have reached an all-time high and have started to focus on organizations we once thought were safer than businesses. Read on to find out how one attack in Atlanta claimed several victims.

Blog
Don’t Get Too Comfortable
Fairly recently, we watched as Equifax fell into some trouble. Soon thereafter, Deloitte found itself in its own cybersecurity situation. If these major companies can be infiltrated, what stopping a cybercriminal from targeting you?

Blog
On Your Guard
Not only are small businesses at an increased risk of being targeted by cybercriminals, once attacked, the likelihood of survival decreases significantly. Keep reading to for tips to help protect your company.

Blog
What You Don’t Know Can Hurt You
The likelihood of your email account being hijacked by malicious program or person is pretty good. And what cybercriminals can (and do) do with your account is bad – really bad. Read on to learn more.

Blog
Education Is The Enemy Of Cybercrime
Cybersecurity isn't going away. In fact, it's getting worse. Find out how Ohio Auditor of State Dave Yost is helping local businesses and government entities combat cybercrime.

Blog
Case Study: How To Survive A Ransomware Attack
Cybercrime is not going away. But you don't have to stand by while a cybercriminal infiltrates your network. Read on to learn how Jess Howard Electric Company beat the odds and survived Ransomware.

Blog
Can A Cybercriminal Crack Your Company’s Network?
Without the proper procedures in place business owners risk the very real threat of a large-scale assault on their company’s data. Would you be able to recover if your organization was attacked?

Blog
Will Your Entity Be Ransomware’s Next Target
Just one accidental click on a phishing email is enough to infect your entity's entire network of workstations and laptops. What will you do to protect your organization from Ransomware?
Feb 6, 2017

Podcast
episode 67 – like rock-n-roll, cyber threats will never die
Cybercrime is on the rise and if you thought 2016 was bad … you haven’t seen anything yet! Businesses, particularly small- to mid-sized businesses with smaller IT budgets, are at risk of a cybersecurity breach, but probably not for the reasons you may expect. If not properly trained, your employees will increase your business’s risk … Continued

Blog
Don’t Take The Bait
As we dive into a new year, it’s likely that we will continue to see an uptick of cybercrime. Will this be the year your database will be breached?

Blog
Government Entities Are Not Immune To Cybercrime
The City of El Paso fell victim to phishing scam that attempted to swindle $3.2 million of taxpayer money from the government entity. Do you know how to respond to a cyberattack?

Blog
Could Your Entity Survive A Ransomware Attack?
I've worked with clients whose businesses were leveled by tornadoes, demolished by explosions, and whose server hardware failure literally sparked catastrophe. You can’t become complacent.

Blog
An Ounce of Prevention
Cybercrime experts estimate that fraudulent activities will be at their worst in 2011 and 2012. Earthquakes, tsunamis, tornados, hurricanes and floods are occurring with increasing frequency. So here’s the obvious question: are you doing enough to protect your financial information? It’s easy to say “it will never happen to us.” But it could happen to … Continued

Blog
Are You Getting your Money’s Worth from Your Investment in Office Technology?
Hardware and software developers are constantly improving their products. As new computers are created to work faster and store more memory, they are capable of running newer, more complex software – software that can do more things to help you better manage your business or organization. But does your technology seem to cost you more … Continued