Cybersecurity Tips, IT Insights & Industry News
Practical advice from HD Tech — your Cyber Lifeguard since 1996.

2026 Cloud Security Checklist for Regulated SMBs
Use this 2026 cloud security checklist for regulated SMBs to strengthen compliance, protect sensitive data, and reduce cybersecurity risks.
Read more
How CFOs Can Evaluate IT ROI More Effectively in 2026
Learn how CFOs can measure IT ROI in 2026. Discover smarter ways to evaluate technology investments, reduce risk, and improve operational efficiency.
Read more
Why Plain-English IT Is a Compliance Advantage in 2026
Why does plain-English IT matter for compliance? Plain-English IT means explaining technology, cybersecurity, and compliance requirements in clear, understandable language instead of technical jargon. In 2026, this approach helps businesses follow security policies correctly, respond to incidents fa
Read more
The Real Cost of IT Downtime in 2026: What SMBs Need to Understand
By Tom Hermstad | President, HD Tech | 30+ Years in IT Security 322 Main St #4, Seal Beach, CA 90740 | 877-540-1684 Last updated: March 2026 The Real Cost of IT Downtime in 2026: What SMBs Need to Understand IT…
Read more
The Evolution of Help Desk Support in 2026: What’s New, What’s Next
What does modern help desk support look like in 2026? Help desk support in 2026 has evolved far beyond basic password resets and troubleshooting. Today’s IT help desk services combine automation, cybersecurity monitoring, remote support, and proactive system management to keep…
Read more
Your Employees Are Already Using AI: How to Secure AI Adoption in Your Business
Are employees already using AI without approval? Yes. In most organizations, employees are already using tools like ChatGPT, Copilot, Claude, or Gemini for emails, document summaries, research, and data analysis — often without formal oversight or policy. Is employee AI usage…
Read more
How Construction Companies Are Using AI to Analyze RFPs, Proposals & ERP Data
Can construction companies safely use AI for RFPs and proposals? Yes — when AI tools like Microsoft Copilot are deployed inside a secure Microsoft 365 tenant and governed by clear usage policies. Public AI tools should never be used for confidential…
Read more
Why Law Firms & Accounting Firms Need a Formal AI Usage Policy Before Adopting Copilot or ChatGPT
By Tom Hermstad, CEO of HD Tech — We manage your tech so you can manage your business. If your firm is talking about Microsoft Copilot or ChatGPT but doesn’t have a written AI usage policy, you’re not leading — you’re…
Read more
How Defense Contractors Can Use AI in a CMMC‑Compliant Environment
By Tom Hermstad, CEO of HD Tech — We manage your tech so you can manage your business. If you handle Controlled Unclassified Information (CUI) and you’re playing with Copilot or Claude in a commercial tenant, you’re not “innovating” — you’re…
Read more
Is Your ‘IT Guy’ Putting You at Risk? 5 Red Flags to Watch For
Why relying on one IT person isn’t enough in 2026 Many small to mid-sized businesses still rely on a single in-house technician or a part-time contractor to manage their IT. While that person may be hardworking and trusted, today’s cybersecurity landscape,…
Read more
Managed IT for Manufacturers: How to Scale Without Compromise
Why IT matters more as manufacturing operations grow In 2026, manufacturers face dual pressures: increasing production demands and tightening cybersecurity and compliance standards. Whether you’re expanding to new facilities, integrating IoT devices, or adopting ERP systems, your IT infrastructure m
Read more
What Every Healthcare CEO Should Know About HIPAA in 2026
Why HIPAA still matters in a post-pandemic, cloud-first world As healthcare organizations accelerate digital transformation, HIPAA remains a core compliance framework—not just a legal obligation, but a business-critical standard. In 2026, the law continues to evolve in response to telehealth expansi
Read more
Why Hybrid Cloud Wins in 2026: A Real-World MSP Breakdown
What is hybrid cloud — and why are businesses choosing it? A hybrid cloud combines the flexibility of public cloud platforms (like Microsoft Azure or AWS) with the control of private infrastructure or on-premises servers. In 2026, this model is the…
Read more
The Cost of Downtime in 2026: What SMBs Need to Understand
What does IT downtime actually cost a small business? While the financial impact of downtime varies by industry and size, the real cost extends far beyond lost revenue. Small to mid-sized businesses (SMBs) face consequences like delayed client deliverables, eroded customer…
Read more
What Is Endpoint Protection — And Why It’s No Longer Optional
What exactly is endpoint protection? Endpoint protection refers to the cybersecurity tools and strategies used to secure individual devices — or “endpoints” — like laptops, smartphones, desktops, and servers that connect to your network. These tools monitor for threats, block malicious…
Read more
Cybersecurity for Construction Firms: The 2026 Compliance Playbook
Why does cybersecurity matter in construction? Construction firms are no longer just targets of physical theft — they’re also being targeted by cybercriminals who see blueprints, bid data, and contractor portals as valuable entry points. With growing digital adoption across project…
Read more
Top 3 Tech Risks for Law Firms in 2026 (and How to Mitigate Them)
Why are law firms prime targets for cyber threats? In 2026, law firms face increasing digital exposure — managing client data, handling sensitive case files, and operating in hybrid work environments. According to the American Bar Association (ABA), over 25% of…
Read more
Beyond the Firewall: A Cybersecurity Checklist for Orange County Defense Contractors
What’s the most critical cybersecurity step for OC defense contractors? A comprehensive gap assessment to meet CMMC and NIST 800-171 requirements. HD Tech offers this strategic evaluation to help identify vulnerabilities before they become compliance failures. How does HD Tech ensure…
Read more
Is Your LA Accounting Firm’s Data Secure? A Guide to Client Data Protection and Compliance
How can LA accounting firms protect client data? By utilizing Managed Detection and Response (MDR), Endpoint Detection and Response (EDR), and Microsoft 365’s advanced compliance tools—all monitored 24/7 by the HD Tech help desk. Why is compliance critical for LA accountants? …
Read more
Improving Project Efficiency with Managed IT for LA Construction Companies
How can managed IT improve construction efficiency in LA? Managed IT services streamline project management through secure cloud access, robust mobile device support, and 24/7 remote help desk availability. This approach minimizes costly delays on Los Angeles job sites, ensuring smooth…
Read more
Cybersecurity for the Construction Site: Protecting Orange County’s Construction Sector from Ransomware
Why is ransomware a threat to OC construction firms? Ransomware can lock critical project data—such as blueprints, contracts, and payroll—bringing job sites to a standstill and costing millions in project delays. How does HD Tech secure construction data? We deploy enterprise-grade…
Read more
Choosing a Cybersecurity-Focused IT Provider in Irvine, CA: A Checklist for Accounting Firms
What should accounting firms in Irvine look for in an IT provider? Seek a partner with proven expertise in regulatory compliance (such as CMMC and HIPAA), comprehensive 24/7 remote support, and deep proficiency in securing platforms like Microsoft 365 to safeguard…
Read more
The 5 Biggest Cybersecurity Compliance Mistakes Defense Contractors Make (And How to Avoid Them)
I’m Tom Hermstad, CEO of HD Tech, your Cyber Lifeguard in Seal Beach, CA. With over 30 years of experience safeguarding businesses, we’ve seen defense contractors navigate the choppy waters of cybersecurity compliance. In this blog, we dive into the five…
Read more
What Is ITSM and Why Should You Care?
IT Service Management (ITSM): A Strategic Approach to Business Technology In today’s business landscape, technology is the engine of productivity and growth. However, without a structured approach, managing IT can quickly become chaotic and reactive. This is where IT Service Management…
Read more
The Real Cost of a Ransomware Attack in Orange County
The True Financial Impact of Ransomware Attacks in Orange County Ransomware attacks cost businesses far more than just the ransom payment—even a single event can result in multi-million-dollar losses, extended downtime, and lasting reputational damage. Recent industry reports estimate the average…
Read more
MSP vs. IT Support: Which Solution Best Grows Your Business?
In today’s business environment, reliable technology is essential to success. The question many business owners face is: should you work with a Managed Service Provider (MSP) or stick with traditional IT support? Understanding each option’s strengths can help you make the…
Read more
IT Services vs. Managed Services: What’s the Real Difference?
I get this question almost daily: “Tom, what’s the real difference between IT services and managed services?” It’s a fair question. Both sound technical. Both involve computers. Both cost money. But here’s the truth—the difference could determine whether your business survives…
Read more
HD Tech: Your Partner for 30 Years of Expert Managed IT Services
For three decades, HD Tech has been delivering managed IT services to businesses across LA and Orange County, helping them operate at peak efficiency while keeping technology risks in check. As we celebrate our 30th year in business, we’re proud to continue providing professional…
Read more
HD Tech: Your Right of Boom Cyber Preparedness Partner
In today’s digital-first business world, cyber threats are no longer a distant concern—they are an inevitable reality. As a managed security services provider serving Southern California, HD Tech delivers more than just managed IT services and professional IT support. Our mission…
Read more
Why Your Business Can’t Afford to Skip Managed Cybersecurity in 2025
In 2025, cyber threats are more advanced, more frequent, and more expensive to recover from than ever before. For business owners, the stakes couldn’t be higher—data breaches, ransomware attacks, and phishing schemes can bring operations to a halt in minutes. The…
Read more
Immutable Backup: Modern Data Protection
Understanding the Power, Benefits, and Verification of Truly Tamper- Proof Backups In a world where cyber threats grow more sophisticated by the day and ransomware attacks can cripple organizations overnight, safeguarding your digital assets is more mission-critical than ever. Traditional backup…
Read more
Stop Wasting Money: The Smart Way to Outsource IT Management in 2025
Running a small business today means keeping up with a fast-paced, technology-driven world. The reality is, IT infrastructure has become the backbone of nearly every business operation—handling everything from data storage to cyber security. But here’s the challenge: maintaining an in-house…
Read more
Modernizing Productivity: How a 4-Year PC Refresh Cycle Powers Efficiency, Security, and Growth
Exploring the Real-World Benefits of Proactive Device Replacement for Exceptional Businesses In a world where technology evolves at breakneck speed, relying on outdated computers can quietly erode productivity, increase operational risks, and sap the spirit of high-performing teams. To stay ahead,…
Read more
Understanding Endpoint Security: The Layers to Proactive PC Protection and Monitoring
Exploring the Critical Components and Modern Solutions for Defending Computer Systems In today’s digital ecosystem, the humble computer, whether a personal device, a workstation, or a point-of-sale system, forms the backbone of organizational productivity and data stewardship. Beneath their familiar
Read more![Prevention is NOT Preparation [PART 3]](/_next/image?url=https%3A%2F%2Fbyyigwnuugghdupnutfp.supabase.co%2Fstorage%2Fv1%2Fobject%2Fpublic%2Fblog-images%2Fai-generated%2F1774397178234-1xavvx.png&w=3840&q=75)
Prevention is NOT Preparation [PART 3]
Prevention is NOT Preparation Think Preparation AND Prevention Preparation – it’s easier to write a check than to spend time – preparation takes time from high level people at your company. Check out all 3 videos -> PART 1 | PART 2 | PART 3
Read more![The Anatomy of a Cyber Attack, an Act of War [PART 2]](/_next/image?url=https%3A%2F%2Fbyyigwnuugghdupnutfp.supabase.co%2Fstorage%2Fv1%2Fobject%2Fpublic%2Fblog-images%2Fai-generated%2F1774397201368-fewoz5.png&w=3840&q=75)
The Anatomy of a Cyber Attack, an Act of War [PART 2]
Bycatch This is an Act of War Check out all 3 videos -> PART 1 | PART 2 | PART 3
Read more
The State of Cybersecurity: Part 1
Sobering Statistics: The Reality of the Situation: Check out all 3 videos -> PART 1 | PART 2 | PART 3
Read more
Why We Do What We Do
Although we do a lot of fixing broken printers and helping people with outlook problems, that is not what gets me up in the morning. Nope. I mean, we have to do it, but that’s not what gets me going and…
Read more
Problems with the MSP Industry
Here with you today to talk about another taboo subject, which is, what are the problems with the managed services industry and these things that I’m going to relate to come from me actually talking with prospective customers and customers about…
Read more
Pricing in the Managed Services Industry
Tom Hermstad with H&D Technologies here, here to talk about a taboo subject, pricing in the managed services industry. When you’re going to get a contract to maintain your computer systems, how do we price? First thing is you got to have…
Read more
2025 Top Things to Think About
Being prepared, we have a saying at H&D Technologies, It’s not if it’s when if they want to get to you they will. So what you do is you prepare for that eventuality of when they get in, what are you going to…
Read more
IT Department Risk Management
Hey, Tom Hermstad with H&D Technologies here to give you another little tech vlog from H&D we call it. And I’ve been doing a number of different vlogs on the technical hiring process you need to be thinking about when you…
Read more
What Is Security Compliance?
If you are intelligent and creative, you can very often find a way to accomplish things that others can’t. Some talented people become trailblazers in their field, consistently meeting goals that they have set for themselves. But left to ourselves, doing…
Read more
Four Major Types of Cyber Threat
When assessing the risks of a security breach, it helps to know what you are up against. Cyber threats can come in many different forms. Understanding the nature of these threats will help us to be more prepared to defend against…
Read more
Hiring Internal IT Staff – Technical Expertise
Hi, this is Tom Hermstad with HD Technologies. This is the hiring internal I.T. series. And this is the second part in the series, and it’s about technical expertise and competency as it relates to hiring the engineer. Then on the…
Read more
Cybersecurity Training for Employees
Your company’s mission is to provide products and services — but there’s a lot more to it. You can make all the widgets that you want, but if you don’t protect them you can lose everything. Ignoring potential threats and vulnerabilities…
Read more
The Cybersecurity Risks of Working from Home
When it comes to cybersecurity, there is not much room for error. Those who fail to adequately secure their IT environment, including remote access employees, may regret their neglect. As more people are working from home rather than at the office, cyber…
Read more
Password Vault – Internet Security Strategy
Everyone knows the importance of passwords. From ancient days, secret passwords have been used to authorize entry for those who know them. Those who could not accurately state the password were restricted access and may even have been considered enemies. That’s…
Read more
Incremental Backup Solutions for Businesses
Regular backup of data is essential, especially for businesses. Without a consistent backup solution, you have no way to recover data in the event of a disaster. Doing a full backup of all files gives you a good foundation for restoration, but…
Read more
System Image Backup & Data Protection
Any business that has suffered a data loss and survived knows the importance of a good backup strategy. Many businesses assume it will never happen and have no backup services or inadequate backup plans. Simply backing up information to discs or…
Read more
Business Backup Solutions: Protect Your Data
Backup Solutions- How to pick the best one for your business Regardless of size, every business needs good backup solutions. Every year, thousands of businesses across the United States lose months or even years of their data because of system crashes…
Read more
Why You Need Network Documentation
You may be bored enough to read the cereal box some morning when you’re eating breakfast, but it’s not particularly exciting literature. Neither is network documentation. But like the cereal ingredients’ description on the box, good documentation will tell you exactly…
Read more
Best Security Practices for Remote Access Users
In the time of Covid-19, many businesses have been forced to ask their employees to work from home. As a result, the work from home (WFH) model may become a permanent alternative for many workers who can effectively complete their required tasks…
Read more
Mobile Device Management with Office 365
Mobile Device Management is important when it comes to your overall technology security strategy. If you have a fleet of phones in use by your employees out in the field, then you basically have an added level of exposure for each…
Read more
Ransomware and Small Business
Held for Ransom Are you aware of the danger of ransomware? As defined on our blog, ransomware is malware (MALicious softWARE) that locks all of the data on your network with encryption. The perpetrators then demand a ransom to unlock your data….
Read more
Passwords aren’t enough-setup MFA and SSO now!!
You are unique in this world, with an identity that no other person has. But sometimes you are called upon to verify your identity in order to access certain services. An identification card may be required for you to cash a…
Read more
What is your backup policy? Do you even have one?
If you are practicing proper computer security measures, then you are running routine backups. Do you have a policy for your backups? Is it written down? If so, then add it to your official policy manual so anyone can easily understand and…
Read more
IT Terms: User Risks
Get IT We know that all the IT (Information Technology) lingo can be confusing. Occasionally we like to post the definitions to terms that we use often. This post is specific to risks that employees encounter often that can completely derail…
Read more
User Security Training – Book it Today
Arming Your Employees With Basic User Security Training Is Job One From desktop to mobile to cloud–technology changes quickly and so do the threats and security measures designed to mitigate them. The best way to arm your staff is thru comprehensive…
Read more
How to Maximize Your MS Office 365 Investment
Microsoft Office 365 offers an expansive selection of apps to add functionality that will increase your productivity and efficiency. Of course, you want to use the best suite of software you can after all your business runs on it! One of…
Read more
The Importance of Proactive IT Maintenance
“Be prepared” is a good motto to live by, especially when it comes to managing IT environments. Every element in your IT architecture is subject to failure. It would be foolhardy to think that everything will continue as is without problems….
Read more
10 IT Security Terms Everybody Should Know
If you want to become acquainted with a particular subject, you must first learn the basic terminology. IT security has its own special terms that are important to the understanding of cyber threats and how to deal with them. In this…
Read more
Firewalls Keep Your Kingdom Safe
As the name implies, a firewall is an outside barrier to your network and a necessary part of your network security arsenal. A firewall has the capability to both fortify your cyber kingdom, keeping unwanted information or predators out, and virtually lower the…
Read more
Hiring Internal IT Staff – Resume Vs Experience
Hey, this is Tom Hermstad with HD Technologies. This is the hiring internal IT staff series. And this first one is on the resume versus experience and how the two rarely meet. The big problem comes when most companies go to…
Read more
System Administrator – The Fundamental Rule
Orange County IT Best Practice • System Administration The #1 System Administrator Rule: Why Your Business Needs Exactly ONE Here’s the counterintuitive truth most Orange County businesses get wrong: you should have exactly ONE system administrator—not two or three. Multiple system…
Read more
Secure Your Internet with a VPN
Secure anonymity is the name of the game when you are doing business over the public Internet. If you work with HD Tech and need to access your business data remotely, we setup VPN (Virtual Private Network) access for you. A VPN protects…
Read more
You Will Be Hacked! Better Get Ready!
Recently I went to a security conference and the FBI Agent there said there are two types of businesses: those that have been hacked and those that have been hacked but don’t know it. OUCH! Have you ever endured the tragedy…
Read more
Small Business Cyber Threats Explained
If you think IT security problems are only caused by teenage hackers in their basements, you’re underestimating the scope of possible threats. While guarding against intrusion by curious geeks, every company needs to be on the lookout for security issues arising…
Read more
Triple Your Cyber Security at the Weakest Level
“It’s not paranoia if they are really after you.” – Tagline for the movie “Enemy of the State” Is your business as safe as it can be from cyber crime? Cyber crime is a real threat and the more digital our universe…
Read more
HR Policies for Tech
The horror of hacks to businesses The scariest part of horror movies is the first scene that shows the fiendish slasher is in the same house or even as close as the same room with the hero or heroine. Many times,…
Read more
Backup, Monitor, Verify – 3 Business Survival Habits
Backups are the single most important survival habit for your business. Period. Everything runs through your computer system. If that system is down-especially for an extended period, you run the risk of your business failing. Studies show that over 70% of…
Read more
What Fits in a Petabyte?
Maybe Apple can use this for icloud! A Petabyte is the latest size hard disc for servers created by Intel. 1 petabyte (PB) = 1048576 gigabytes (GB). This is great news for your server room as it will greatly reduce the…
Read more
Consequences of Switching Small Business 365 Plans
This is an operational update to all my friends in the MSP community but can also be useful to anyone that has small business based office 365 plans. As of December 1, 2015 Microsoft has begun to force all small business…
Read more
Why Choose Office 365 for Your Business
Blog Why Office 365? Posted by hdtech On March 13, 2015 https://www.facebook.com/v2.6/plugins/share_button.php?app_id=144240632325488&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Dfd9261b30a0e5a2b3%26domain%3Dwww.hdtech.com%26is_canvas%3Dfalse%26orig
Read more
What to think about before a VOIP installation
These days many business are looking at VOIP (Voice Over Internet Protocol) Phone Systems. Instead of carrying calls on conventional phone lines, the voice is carried encrypted across the internet. While VOIP is usually the way to go, there are things…
Read more
Business IT Security Services & Consulting
Technology poses security risks from within and outside every business. H&D Technologies can provide offsite IT security it security service and protection services along with monitoring and consulting services to eliminate risk. Inside Are you worried about the security risks associated with employ
Read more
Continuity and Disaster Recovery
Continuity refers to the ability to get your systems running quickly during an outage. When your server goes down and can’t be brought back up – now what? If you have regular, non-image based backups, here are the steps: *Also remember…
Read more
Business Password Security Guide
We ran across this interesting article on passwords and it prompted us to write this review on password security for your business. The premise of the article is that a computer program can be created to crack the typical passwords we are all…
Read more
Run – Don’t Walk – to Hard Disk-Based Backups
This is the second installment in the backup series, the first being on the use of tape. We are currently in the best place for backups in the 30 years I’ve been doing IT. Disk-based backups are awesome! The best! If…
Read more
Backups: Beware of Tape!
You’re going to be hearing a lot on backups in the coming weeks, a favorite topic and one that often is ignored by business owners. Besides the work you perform on your systems, backups are the most important thing you can do to…
Read more
Top 10 IT Priorities (5 Now, 5 Later)
The days of having an actual hardware server for each business function (file storage, database, email) are over, you can now run multiple ‘virtual’ machines on one server. Virtualization is a big topic, suffice it to say you need to research…
Read more
Business Cloud Backups Explained
It’s Sunday, and I’m looking outside at the gray ‘June gloom’ day in California, and I’m thinking about clouds. Why not talk about ‘cloud’ backups? Firstly, a quick update on the cloud. The term gets bandy about a lot these days,…
Read more
Microsoft moving to outsourced IT model
Microsoft recently announced that it has forged a deal with Infosys Technologies to manage all of its IT operations. This is a tremendous confirmation for the effectiveness of the outsourced IT model. A large, well known, technology company like Microsoft would…
Read more
BYOD – the good vs. the ugly!
If your company has opened its doors to the use of personal mobile devices, iPads and tablets for work purposes you are one of the many who are beginning to allow them into work. Productivity is enhanced if an employee is…
Read more
Proactive IT Support & Monitoring Services
When I tell people what I do, they invariably respond…I get it you fix computers. Nothing could be further from the truth. While we do, in the course of a normal day, ‘fix’ peoples computers (which encompasses servers, desktops, laptops, network…
Read more
Backups, Backups, Backups
…You have backups in place, right? Lets start with some simple questions to refine your answer. 1) do you get a report daily that shows that your backups worked?2) do you check to ensure your backups include the data you need…
Read more