


Supply Chain Vulnerabilities
Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to our next segment in the Cyber Series. Today’s topic is supply chain vulnerability. And to illustrate the magnitude of the issue, I wanted to throw up a quick graphic, and then we’ll...
A Brief Explanation of Multi-Factor Authentication
Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to our next segment in the cybersecurity series. Last week, we focused on third party risk assessments and why they’re so important in determining where your risks actually are so that you...