Author: Travis Strong

Article
Understanding the Dark Web: A Guide for Business Leaders
We often hear the term "dark web" thrown around. But what does it really mean? And more importantly, what do business leaders need to know? Let's shed light on this mysterious corner of the internet and understand its implications for your business.

Article
Cybersecurity Awareness Matters: Why Protection is for Everyone
In today's digitally driven world, where technology reigns supreme, cybersecurity has become an indispensable aspect of business operations. Whether you're running a sprawling corporate empire or a small local business, the importance of cybersecurity cannot be overstated.

Article
Navigating the Risks: How Technology Poses Threats to Your Business
Technology is an integral part of almost every aspect of business operations. From streamlining processes to enhancing communication, technology has undoubtedly brought numerous benefits to companies. However, along with its advantages, technology also poses various risks that businesses must be vigilant about. For your business to operate successfully, you must explore the potential risks that technology can present and discuss strategies to mitigate them effectively.

Events
Leveraging AI and ChatGPT for Business Success
Join Rea’s Travis Strong, CISA and Josh Anderson, PMP CISSP, Certified Ethical Hacker (CEH), GCIH, as they cover the basics of AI and Chat GPT, including what it is and why that matters for your business with special consideration for risks and guardrails.

Blog
The Three Components of Information Security
A data breach can certainly be harmful to your business, and whether it is the cause of an accidental event or an intentional action, it can damage your organization’s reputation or cause financial loss. So, what does it take to protect your data?

Blog
Concern About Cyber Threats Heightened by Russian Invasion
Russia’s invasion of Ukraine has involved comprehensive cybersecurity attacks, both military in origin as well as activist oriented.

Article
Data Security and Backup Options Essential to Selecting the Right Cloud-based Platform
Considering new options for cloud services, you are likely looking at Microsoft 365, the cloud-based platform for the ubiquitous Microsoft Office Suite.

Blog
Could Your School Survive A Data Breach?
Could your school survive a data breach? What you need to know to keep your school district safe.

Blog
Are You Certified?
Currently, over 300,000 companies conduct business with the U.S. Department of Defense (DoD). If yours is one of them, you need to know about the Cybersecurity Maturity Model Certification (CMMC).

Blog
Is The PrintNightmare Over? Are You Safe?
Here's how to find out if your system has the correct Microsoft Patch installed to protect you from PrintNightmware.

Blog
Rea Dental Client Uncovers Cybersecurity Risks After Risk Assessment
Yes, when it comes to cybersecurity, what you don't know CAN hurt you.

Blog
Cybersecurity: All The Things You Should Know
Wondering if your business is at risk of a cyberattack? Look to the statistics ... or, this article.

Blog
New Windows Vulnerability Is A Nightmare For Businesses
Read on to gain insight into the new PrintNightmare vulnerability.

Blog
Understanding The Important Role IT Security Plays In Your Dental Practice
What are you doing to protect your patient's data and your medical practice?

Events
Are You Managing Your Cybersecurity Risk Exposure?
If your company became the newest victim of a cyber attack, would you be able to recover?

Blog
What Could A Cybercriminal Do To Your Dental Practice?
Your dental practice could be one click away from disaster. Learn how to protect it.

Blog
Are There Holes In Your Data Security Infrastructure?
Do you know what your IT department does to keep your company's data safe? We're offering a look behind the curtain.

Blog
Perspectives: What Does The IT Department Do?
Check out this list to find out if you really know what your IT department does.

Blog
Transforming Through Technology
Find out how we're leveraging technology to create efficiencies and capacity at Rea!

Blog
Data Breach Reported By Ubiquiti
Does your company utilize Ubiquiti devices? Don't wait. Take these data security measures now to protect your organization from hackers.

Blog
‘Ink Is Cheap. Legal Defense Is Expensive’
Are your business contracts putting you at risk? What you don't know will surprise you.

Blog
Protect Your Business From COVID-19 Cyber Attacks In 3 Steps
Free Resources For Business Owners Promote Greater Cyber Security And Data Protection.

Blog
One Wrong Click Can Spell Danger
The digital threat is real and not only is it catastrophic to the larger businesses, smaller companies are paying the price. Read on to learn more.

Blog
SHIELD Act Designed To Protect Consumer Privacy
Businesses To Comply With Cybersecurity Implementations as SHIELD Act Takes Effect March 21, 2020 Time is ticking for new and improved cybersecurity safeguards for businesses as the SHIELD Act’s data security deadlines take effect on March 21, 2020. New York’s “Stop Hacks and Improve Electronic Data Security Act” (SHIELD Act), N.Y. Gen Bus. Law§ 899-bb … Continued

Blog
Passwords: Turns Out We’ve Been Doing It Wrong This Whole Time
Report reveals that we've been creating and managing our passwords all wrong.

Blog
The Best Thing Since The Internet?
Is blockchain and cryptocurrency the way of the future? You be the judge.

Blog
Payday Problems: Cyber-Criminals Steal Payroll Funds From Atlanta Public Schools
Cyber-attacks have reached an all-time high and have started to focus on organizations we once thought were safer than businesses. Read on to find out how one attack in Atlanta claimed several victims.

Blog
Don’t Get Too Comfortable
Fairly recently, we watched as Equifax fell into some trouble. Soon thereafter, Deloitte found itself in its own cybersecurity situation. If these major companies can be infiltrated, what stopping a cybercriminal from targeting you?

Blog
On Your Guard
Not only are small businesses at an increased risk of being targeted by cybercriminals, once attacked, the likelihood of survival decreases significantly. Keep reading to for tips to help protect your company.

Blog
What You Don’t Know Can Hurt You
The likelihood of your email account being hijacked by malicious program or person is pretty good. And what cybercriminals can (and do) do with your account is bad – really bad. Read on to learn more.

Blog
Education Is The Enemy Of Cybercrime
Cybersecurity isn't going away. In fact, it's getting worse. Find out how Ohio Auditor of State Dave Yost is helping local businesses and government entities combat cybercrime.

Blog
Case Study: How To Survive A Ransomware Attack
Cybercrime is not going away. But you don't have to stand by while a cybercriminal infiltrates your network. Read on to learn how Jess Howard Electric Company beat the odds and survived Ransomware.

Blog
Can A Cybercriminal Crack Your Company’s Network?
Without the proper procedures in place business owners risk the very real threat of a large-scale assault on their company’s data. Would you be able to recover if your organization was attacked?

Blog
Will Your Entity Be Ransomware’s Next Target
Just one accidental click on a phishing email is enough to infect your entity's entire network of workstations and laptops. What will you do to protect your organization from Ransomware?

Blog
Don’t Take The Bait
As we dive into a new year, it’s likely that we will continue to see an uptick of cybercrime. Will this be the year your database will be breached?

Blog
Government Entities Are Not Immune To Cybercrime
The City of El Paso fell victim to phishing scam that attempted to swindle $3.2 million of taxpayer money from the government entity. Do you know how to respond to a cyberattack?

Blog
Could Your Entity Survive A Ransomware Attack?
I've worked with clients whose businesses were leveled by tornadoes, demolished by explosions, and whose server hardware failure literally sparked catastrophe. You can’t become complacent.