Blog

Celebrating Legacy Leadership

Celebrating Legacy Leadership

Hi, Scott Munden here from Huntleigh Technology Group. Welcome to this segment of our leadership series. The topic for today is legacy leadership. And I chose that topic for a couple of reasons. One is around the end of the year, I typically like to reflect on what...

read more
Supply Chain Vulnerabilities

Supply Chain Vulnerabilities

Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to our next segment in the Cyber Series. Today's topic is supply chain vulnerability. And to illustrate the magnitude of the issue, I wanted to throw up a quick graphic, and then we'll discuss in...

read more
A Brief Explanation of Multi-Factor Authentication

A Brief Explanation of Multi-Factor Authentication

Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to our next segment in the cybersecurity series. Last week, we focused on third party risk assessments and why they're so important in determining where your risks actually are so that you can...

read more
Cybersecurity 3rd Party Assessments

Cybersecurity 3rd Party Assessments

Hi, Scott Munden here from Huntleigh Technology Group. We wanted to thank everybody for the fantastic response we've been getting on our tips and guidance on a variety of different cybersecurity topics and welcome you to our video series that will be rolling out over...

read more