Michael Markulec

technology executive, cyber-security guru, politician, rugby player, deadhead, brewer, former army officer, crossfitter, and hard-drinking calypso poet.

2 min read

Securing the Future: Cybersecurity Imperatives for the Manufacturing Sector

Cyberattacks pose a serious and ongoing threat to the manufacturing sector in today's rapidly changing technological environment. This sector's vulnerability arises from its intricate supply chain, the wealth of intellectual property it holds, and...

Read More
Construction Worker on Cybersapce background

2 min read

Building Strong Defenses: Navigating Cybersecurity Challenges in the Construction Sector

Following the global coronavirus pandemic, there has been a sharp shift toward digital transformation across all businesses. The construction sector,...

Read More
Identity and Access Management

2 min read

Identity and Access Management (IAM) in Security Strategies

Identity and access management (IAM) has become a key security component in the constantly changing cyber and information security world. What was...

Read More

2 min read

Safeguarding against Business Email Compromise (BEC)

While large corporations often make the headlines, small and medium-sized organizations increasingly become targets of sophisticated attacks, with...

Read More
Weaponized AI

1 min read

The Emerging Threat of Weaponized Generative AI: Safeguarding Security

In the wake of AI's rapid advancements, weaponized generative AI has surfaced as a significant concern. Highlighted in a recent Forbes article titled...

Read More
Safeguard your business

2 min read

Safeguarding Your Small Business: A CEO's Guide to Cybersecurity

In today's interconnected digital world, the security of your small business is paramount. As a CEO, understanding and implementing effective...

Read More
Patch Management

2 min read

Mastering Patch Management: Best Practices for SMB Cybersecurity

Data security is paramount in the fast-paced world of digital business, where technology drives operations. If you're a small or medium-sized...

Read More
Acceptable use policy

2 min read

Do We Need Employee Acceptable Use Policies For Workplace Technology?

Businesses must be proactive in protecting their data and network from cyber-attacks in today's hybrid work environment, where remote work is...

Read More
Cyber Risk Assessment

1 min read

Cybersecurity Risk Assessments for SMBs

In the current digital environment, small and medium-sized businesses (SMBs) are not exempt from cyber threats. Recent data highlights the growing...

Read More
Phishing Training

2 min read

Phishing Awareness Training

As cybercrime expands, phishing attacks have reached unprecedented levels, posing a significant threat to individuals and organizations alike. This...

Read More