Skip to the main content.

Michael Markulec

technology executive, cyber-security guru, politician, rugby player, deadhead, brewer, former army officer, crossfitter, and hard-drinking calypso poet.

Email Security

6 min read

How Companies Can Improve Email Security on Mobile Devices

Mobile devices now account for over 60% of corporate email access. Yet, they remain one of the weakest links in enterprise security—exposing organizations to phishing attacks, data breaches, and unauthorized access that can cripple operations...

Read More
Cybersecurity Fraud Prevention

5 min read

Cyber Tax Fraud Prevention Strategies Every Small Business Should Know

Small businesses lose millions annually to tax-related cyber fraud—discover the critical security strategies that can protect your organization from...

Read More

5 min read

How to Create a Conditional Access Policy in Microsoft Entra ID

Strengthen your organization's identity security posture by implementing conditional access policies that protect your cloud resources without...

Read More
Acceptable Use Policy

5 min read

Understanding Acceptable Use Policy: Safeguarding Company Technology

An Acceptable Use Policy is your first line of defense against insider threats, data breaches, and compliance violations—learn how to build one that...

Read More
CFO Cybersecurity

5 min read

The CFO's Role In Cybersecurity

As cyber threats increasingly impact financial performance and business continuity, CFOs are emerging as critical partners in building resilient...

Read More
Cybersecurity Risk as Enterprise Risk

6 min read

Board Members Must Treat Cybersecurity As An Enterprise Risk: Insights From The NACD

Board directors face mounting pressure to elevate cybersecurity from an IT concern to a strategic enterprise risk that demands governance-level...

Read More
CMMC 2.0 Protects Sensitive Defense Information

6 min read

Understanding The DoD's Cybersecurity Maturity Model Certification (CMMC) 2.0 Program

Navigating CMMC 2.0 requirements is essential for defense contractors seeking to protect controlled unclassified information and maintain eligibility...

Read More
Cyber Shield

5 min read

Cyberattacks Getting More Adaptive And Harder To Detect: The Role Of Stolen Credentials, Fileless Techniques, And Generative AI Tools

Modern cyberattacks are evolving at an unprecedented pace, leveraging stolen credentials, fileless malware, and AI-powered tools to bypass...

Read More
Digital Privacy

5 min read

The Importance Of Data Privacy In Your Digital Life

In a world where cyber threats constantly evolve, safeguarding your digital data is essential to protect your personal and professional well-being.

Read More
PCI

4 min read

A Small Business Guide to PCI: Accepting Credit Card Payments Securely

Unlock secure growth for your small business by mastering PCI compliance and safeguarding every credit card transaction.

Read More