Hi everyone, Scott Munden here from Huntleigh Group. Welcome to the final sequence. Part four in our cybersecurity series is on the security roadmap. In the final sequence here, we want to give you some takeaways in terms of how to maximize the value of your security...
Hi everyone, Scott Munden here from Huntleigh Group. Welcome to part three in our cybersecurity series on the security roadmap. Part three we’re going to talk about the difference between a security roadmap and a WISP, which is a written information security...
Hi, everyone, Scott Munden here from Huntleigh Group. Welcome to part two in our cybersecurity series on a security roadmap. In part one, we talked about the purpose and scope of the roadmap and then some of the things that you’re going to want to look at,...
Hi, everyone, Scott Munden here from Huntleigh Group. Welcome to the introduction of our four part cybersecurity series on a security roadmap. While you see the key elements you’ll have to consider in your roadmap on the left hand side of the screen, let me give...
Hi, everyone, Scott Munden here from Huntleigh Group. Welcome to the final sequence, part eight of our active listening series. This section we’re going to discuss acknowledging and responding appropriately. So if you’ve been practicing the techniques...
Download our FREE eBook “Cybersecurity: Five Simple Warning Signs You Can’t Ignore” to find out if you are properly protected against hackers and other online threats.
Thank you for your interest in HTG-Converge. We look forward to providing more details or answering any questions you have. Remember, you are always welcome to book a free appointment online if you prefer to have a discussion at your convenience.