Our Blog
October is Cybersecurity Month
Of course, every month is cybersecurity month here at JM Addington Technology Solutions but for most businesses your core focus is on something else: your [...]
Goliath has fallen
Goliath has fallen. MGM Properties got hit and they got hit hard. Yes, I’m talking about the company that owns 31 unique gambling and hotel [...]
What is Co-Managed?
Help Your Business Thrive With Co-Managed IT Services Over the past few years, awareness about co-managed IT services has significantly increased. Businesses of varying sizes [...]
Questions Every IT Professional Should Say Yes To
Having an IT Professional builds up a lot of benefits for any business field. Business owners have a wide variety of responsibilities. In many cases, [...]
Generative AI: Big Step Forward or Huge Downfall?
The discourse around artificial intelligence (AI) often falls into two polarized camps: one hailing it as the greatest innovation since the printing press, and the [...]
SEC Cybersecurity Rule Update
The SEC cybersecurity rule is proposed on March of 2022 (See our report on it at http://ria.tips/ebook) They opened it up for comments again in March. [...]
Compliance Standards in Cyber Security
Compliance standards are, in one way or another, relevant and important to any business. There is an endless number of things a business owner should [...]
RIA Cybersecurity Regulations: What’s to Come
Tennessee implemented the RIA cybersecurity regulations for state-registered RIAs that goes into effect July 1, with no grace period. The low down: RIAs are required [...]
GM As Critical Infrastructure
Kevin Tierney, GM's chief cybersecurity officer, is increasingly focusing on power-grid security due to the shift away from gas-powered cars. This, in turn, makes GM [...]
The Cybersecurity Talent Gap and How MSPs Can Help SMBs
The cybersecurity industry has been facing a talent shortage for years, and it's becoming increasingly challenging for small and medium-sized businesses (SMBs) to hire cybersecurity [...]
The Compliance Tie-In
If your data is in the cloud, then your compliance efforts must focus there. You can’t outsource your compliance. At one point storing your data [...]
Have Cloud Alerting for A Proactive Protection!
Cloud Alerting is essential, but what else can you do to prevent attackers from getting in at all? MFA: Multifactor authentication is the #1 thing [...]
Why Use Us For Cloud Alerting? Because I Wrote The Plan
A couple of years ago a Cloud Security Service asked us to trial their product. It was a good product but it lacked automatic [...]
How Does A Cloud Security System Detect Attackers?
At the heart of it, Cloud Security solutions look for unusual behavior. This means that the solutions detect any activities that are out of the [...]
How Do Attackers Get In?
A lot of the time they just ask. No, seriously. 1 in 5 people will click on a malicious link. They log into what they think [...]