Bycatch This is an Act of War Check out all 3 videos -> PART 1 | PART 2 | PART 3
The Cyber Security Eco-System – Statistics & the Reality of the Situation [PART 1]
Sobering Statistics: The Reality of the Situation: Check out all 3 videos -> PART 1 | PART 2 | PART 3
Problems with the MSP Industry
Here with you today to talk about another taboo subject, which is, what are the problems with the managed services industry and these things that I’m going to relate to come from me actually talking with prospective customers and customers about…
2025 Top Things to Think About
Being prepared, we have a saying at H&D Technologies, It’s not if it’s when if they want to get to you they will. So what you do is you prepare for that eventuality of when they get in, what are you going to…
Tech Hiring Risk
Hey, Tom Hermstad with H&D Technologies here to give you another little tech vlog from H&D we call it. And I’ve been doing a number of different vlogs on the technical hiring process you need to be thinking about when you…
What Is Security Compliance?
If you are intelligent and creative, you can very often find a way to accomplish things that others can’t. Some talented people become trailblazers in their field, consistently meeting goals that they have set for themselves. But left to ourselves, doing…
Four Major Types of Cyber Threat
When assessing the risks of a security breach, it helps to know what you are up against. Cyber threats can come in many different forms. Understanding the nature of these threats will help us to be more prepared to defend against…
Hiring Internal IT Staff – Technical Expertise
Hi, this is Tom Hermstad with HD Technologies. This is the hiring internal I.T. series. And this is the second part in the series, and it’s about technical expertise and competency as it relates to hiring the engineer. Then on the…
Cybersecurity Training for Employees
Your company’s mission is to provide products and services — but there’s a lot more to it. You can make all the widgets that you want, but if you don’t protect them you can lose everything. Ignoring potential threats and vulnerabilities…
The Cybersecurity Risks of Working from Home
When it comes to cybersecurity, there is not much room for error. Those who fail to adequately secure their IT environment, including remote access employees, may regret their neglect. As more people are working from home rather than at the office, cyber…