Multi-factor Authentication: 5 Facts to Know
Multi-factor authentication should be part of a multi-layered approach to protecting your organization. Here’s how it works.
Employee Spotlight: Stephen Lucero, Customer Service Specialist
Meet Stephen Lucero, Customer Service Specialist at ZAG Technical Services, where he’s involved with Help Desk and support requests.
Incident Response Planning: What You Need to Know
Incident response planning should be an integral part of protecting your company from an attack or breach. Here’s what you need to know.
PII: Why Your Organization Should Care
Personally identifiable information, or PII, should be protected. But what should organizations do to ensure that it is?
What the Ag Industry Can Learn from the Colonial Pipeline Hack
The Colonial Pipeline hack was a reminder that the supply chain is at risk. Here’s what the agriculture industry can learn to prepare.
The One Thing – Cisco Duo MFA Lunch ‘n Learn
Multi-Factor Authentication is a simple, effective way to improve your security posture. Learn how in this lunch ‘n learn presented by Cisco.
Employee Spotlight: Joe Foos, Development Director, Client Strategy
Meet Joe Foos, Development Director at ZAG Technical Services, where he’s involved with client strategy and sales.
How to Create a Firewall: Best Practices for Protecting Internal Networks
Creating a firewall can help protect your network from unauthorized access. ZAG provides best practices for implementing a firewall.
Employee Spotlight: C.J. Morgan, Senior Database Administrator
Meet C.J. Morgan with ZAG Technical Services, Senior Database Administrator/Architect, and learn more about her role at ZAG.
Risk Management for the Supply Chain: Putting a Plan in Place, Part 2
Following a risk assessment to determine which vendors or suppliers pose a risk to your supply chain, management comes next. Here’s why.
Risk Assessment in the Supply Chain: Why It Matters, Part 1
Assessing your supply chain risk is a critical first step in identifying potential deficits in your company’s ability to deliver products to customers.
UPS Run Time, Redundancy, and Outages, Part 3
Selecting the right uninterruptible power supply for your business should include considerations for run time, redundancy, and outage preparation.
Surveillance Camera Breach Opens Up Discussions Around Third-party IoT Devices
Networked devices can be vectors for cybersecurity threats, making IoT security and vendor selection a priority.
UPS Power and Load Management Factors, Part 2
Let ZAG walk you through the factors that need to be considered when selecting an uninterruptible power source, like voltage and amperage.
Cyber Insurance: What You Should Know
Cyber insurance is more widely available given the number of breaches occurring daily. But what is it and how can it help?
The Importance of an Uninterruptible Power Supply, Part 1
Having an uninterruptible power supply is essential across businesses in the supply chain to maintain your operations’ continuity. Here’s how.
Best Practices for Wireless and BYOD
Wireless networks are essential for today’s businesses – no matter their size. But you must implement best practices for wireless and BYOD deployments.
The Skype is Falling: The Benefits of Adopting Microsoft Teams Early
Don’t wait for Skype to reach its end of life; the time is now to implement Microsoft Teams into your business.