Videos

Check Out Our Content

The Biggest Cybersecurity Myths BUSTED!

The Biggest Cybersecurity Myths BUSTED!

Back to videosWhat are the biggest cybersecurity myths? This webinar will BUST the most common cybersecurity myths! Do you believe in these myths?TOM: Today’s topic – welcome to Deeper Dive. We do these every Tuesday, whether you need them or not. The Deeper Dives are...

Florida Water Utility Breach – Follow Up

Florida Water Utility Breach – Follow Up

Back to videosHackers remotely accessed the water treatment plant of a small Florida city and briefly changed the levels of lye in the drinking water, in the kind of critical infrastructure intrusion that cybersecurity experts have long warned about. What really...

The Alarming Truth About Public Wifi

The Alarming Truth About Public Wifi

Back to videosMost people are surprised to find out the many dangers of using public wifi. It isn't as safe as one might think. What are the dangers and how do you protect yourself? TOM: Welcome, everybody. This is our Deeper Dive series that we do every Tuesday...

The Cyber Pandemic Continues

The Cyber Pandemic Continues

Back to videosAs the COVID-19 pandemic continues, so do the cyber criminals. As of Q3 of 2020, the average ransom payment is $233,817. Malicious actors are more ruthless than ever. Ransomware is your biggest threat, without the proper protection in place, you are left...

BREAKING NEWS: Hackers Tried to Poison Water Supply of Florida Town

BREAKING NEWS: Hackers Tried to Poison Water Supply of Florida Town

Back to videosHackers remotely accessed the water treatment plant of a small Florida city and briefly changed the levels of lye in the drinking water, in the kind of critical infrastructure intrusion that cybersecurity experts have long warned about. The attack in...

Vulnerability vs. Penetration Testing

Vulnerability vs. Penetration Testing

Back to videosWhat is vulnerability testing? What is penetration testing? Do I need to implement these services within my business? Why is vulnerability testing and penetration testing important?TOM: Welcome, everybody. This is our usual Tuesday afternoon 2 p.m....

How to Lead a Cybersecurity Culture

How to Lead a Cybersecurity Culture

Back to videosDid you know human error is your biggest cybersecurity threat? Don’t fall victim to hackers because of careless employees. In this webinar you will learn -how do you lead a cybersecurity culture? What is a cybersecurity culture and why is it so important...

Why You Should Trust Us

Why You Should Trust Us

Back to videosWhy should you trust IronTech Security as your MSSP (managed security services provider)?TOM: All right, everybody. Welcome to this Tuesday Deeper Dive. We do these every Tuesday at 2 p.m. Central Time. I see we have a light turnout today, so I’m only...

Streamlining Law Firm Management with Expert Outsourcing

Streamlining Law Firm Management with Expert Outsourcing

Back to videosIn this webinar, you will discover how visionary law firms are virtualizing fractional finance, security, and IT experts to improve their bottom line with great talent.KINDSEY: I want to start off by thanking everyone for joining us this afternoon today...

Why Antivirus Isn’t Enough

Why Antivirus Isn’t Enough

Back to videosDid you know relying on antivirus to protect your business is leaving you vulnerable to malicious cyber attacks?DAVIN: Thank you all for attending. I am very, very excited to start this series. Like Kindsey said, there is going to be one every week...

[activecampaign form=38 css=0]
<div class='_form_38'></div><script type='text/javascript' src='https://kirkham.activehosted.com/f/embed.php?static=0&id=38&62C4E68E63E9E&nostyles=1&preview=0'></script>