Contacts
SUPPORT
Close

Contacts

H&D Technologies, LLC
322 Main Street
Suite 4
Seal Beach, CA 90740

Phone: 877-540-1684

Email: info@hdtech.com

Category: Uncategorized

The-Anatomy-of-a-Cyber-Attack-an-Act-of-War-PART-2

The Anatomy of a Cyber Attack, an Act of War [PART 2]

Bycatch This is an Act of War Check out all 3 videos -> PART 1 | PART 2 | PART 3

Read More
The-Cyber-Security-Eco-System-Statistics-the-Reality-of-the-Situation-PART-1

The Cyber Security Eco-System – Statistics & the Reality of the Situation [PART 1]

Sobering Statistics: The Reality of the Situation: Check out all 3 videos -> PART 1 | PART 2 | PART 3

Read More
Problems with the MSP Industry

Problems with the MSP Industry

Here with you today to talk about another taboo subject, which is, what are the problems with the managed services industry and these things that I’m going to relate to come from me actually talking with prospective customers and customers about…

Read More
2025 Top Things to Think About

2025 Top Things to Think About

Being prepared, we have a saying at H&D Technologies, It’s not if it’s when if they want to get to you they will. So what you do is you prepare for that eventuality of when they get in, what are you going to…

Read More
Tech Hiring Risk

Tech Hiring Risk

Hey, Tom Hermstad with H&D Technologies here to give you another little tech vlog from H&D we call it. And I’ve been doing a number of different vlogs on the technical hiring process you need to be thinking about when you…

Read More
Checklist box

What Is Security Compliance?

If you are intelligent and creative, you can very often find a way to accomplish things that others can’t. Some talented people become trailblazers in their field, consistently meeting goals that they have set for themselves. But left to ourselves, doing…

Read More
cyber-security-3BYUWM7

Four Major Types of Cyber Threat

When assessing the risks of a security breach, it helps to know what you are up against. Cyber threats can come in many different forms.  Understanding the nature of these threats will help us to be more prepared to defend against…

Read More
youtube-thumbnail-template-for-gaming-streamer-tips-935a-2

Hiring Internal IT Staff – Technical Expertise

Hi, this is Tom Hermstad with HD Technologies. This is the hiring internal I.T. series. And this is the second part in the series, and it’s about technical expertise and competency as it relates to hiring the engineer. Then on the…

Read More
woman-working-on-a-laptop-GTBKRNM-scaled-scaled

Cybersecurity Training for Employees

Your company’s mission is to provide products and services — but there’s a lot more to it. You can make all the widgets that you want, but if you don’t protect them you can lose everything. Ignoring potential  threats and vulnerabilities…

Read More
working-from-home-44HF4VG-scaled-scaled

The Cybersecurity Risks of Working from Home

When it comes to cybersecurity, there is not much room for error. Those who fail to adequately secure their IT environment, including remote access employees, may regret their neglect. As more people are working from home rather than at the office, cyber…

Read More