Blog

What is SOC-2 compliance?

As Cyberattacks and data breaches continue to increase, the need for security standards to protect sensitive Information also increases. SOC 2 Compliance is one of the most popular attestation reports designed specifically for these purposes. The importance of SOC-2 Compliance ...

What to look for when selecting an MSP

There are a variety of managed service providers (MSP) and IT providers out there, attempting to attract businesses who don’t have an in-house IT department. For many SMBs, the amount of providers can be overwhelming, and it can lead to ...

The importance of user awareness training

One of the most important assets in every business are the employees, but they can also be the weakest link in your cybersecurity framework. One wrong click in a malicious email can unleash malware into your entire network and compromise ...

Vulnerability scans vs. penetration testing: what’s the difference?

Vulnerability scans and penetration tests (or pen tests) are two standard terms used in cybersecurity, and sometimes it can be challenging to differentiate between the two terms. So, let’s look at what each term means and the differences. TAG Solutions ...

Understanding Risk is the Foundation of Great Cybersecurity

When you go for a hike at the Glacier National Park, in the state of Montana, you run the risk of having an encounter with an apex predator, the grizzly bear. The thought of coming face to face with a ...

In Case You Missed It: Microsoft 365 Backup Webinar

Microsoft 365 is a critical part of so many business processes. Yet the built-in backup options are often insufficient and can lead to the loss of valuable and essential data. TAG Solutions and iland have teamed up with Veeam to ...

Credential Stuffing: What is it and how can you prevent it?

Credential stuffing might not be a phrase you’re very familiar with, but it is becoming one of the most common ways that hackers can take over your personal accounts. The ideology behind credential stuffing is that most people use the ...

What is the 3-2-1 Backup Rule?

The 3-2-1 backup rule is a key component in your cybersecurity and disaster recovery planning. It’s been a practice that companies and IT professionals have implemented for decades. But what does this actually mean? Let’s break it down: 3 is ...

Information Security Policy Matters

Baseball is the national pastime of America. The game is pretty simple to follow, but it also has lots of rules. And if you want to play baseball, you must play by the rules. In fact, the Major League Baseball ...

Winter Work from Home Security Tips

While many businesses and industries are struggling financially due to the COVID pandemic, there is one industry that is expected to make over $6 trillion in 2021. What industry is that? Cybercrime. We saw a huge rise in cybercrime incidents ...

Contact

TAG SolutionsTAG Solutions Logo $$$

Latest Articles

Raising the Bar: Technology and Customer Expectations

Posted by tagsolutions On
Raising the Bar: Technology and Customer Expectations

Hidden Technology Barriers Crippling Small Businesses

Posted by tagsolutions On
Hidden Technology Barriers Crippling Small Businesses