Skip to main content
Insights

Insights & updates

Explore the latest trends, expert guidance, and actionable insights in IT cybersecurity. Filter content by topics that matter most to your business.

Business Identity Theft Industry Insight

Technical Webinar: How to Maximize Your Microsoft Secure Score

Join us as we dive into Microsoft Secure Score and how it can help you strengthe...

Business Identity Theft Industry Insight

Is your Microsoft environment protected from Storm-2372

Are you protecting the core of your business operations from Storm-2372? In case...

Business Identity Theft Industry Insight

How to Help Prevent Vendor Fraud

It’s 2025, businesses are all online, their vendors are all online, and they are...

Article Image
Business Identity Theft Industry Insight

Tutorial: SCuBA Your Microsoft 365

Introduction Managing security and compliance in Microsoft 365 (O365) is crucial...

Business Identity Theft Industry Insight

Technical Webinar: SCuBA Your Microsoft 365

This webinar is all about SCuBA. A powerful security scanning and assessment sol...

Business Identity Theft Industry Insight

How to Use Microsoft Secure Score to Build a Long-Term Security Roadmap

You’ve raised your Microsoft Secure Score and aligned it with NIST CSF in our pr...

Business Identity Theft Industry Insight

Aligning Microsoft Secure Score with Industry Standards: A Guide to NIST CSF

We showed you quick wins to boost Microsoft Secure Score in our previous post. B...

Business Identity Theft Industry Insight

Top 5 Microsoft Secure Score Recommendations for Immediate Impact

We’ve covered what Microsoft Secure Score is and why it’s crucial. Now, let’s ge...

Business Identity Theft Industry Insight

What Is Microsoft Secure Score and Why Should You Use It

If you’re looking for the key to enhancing your organization’s Microsoft 365 sec...

Article Image
Business Identity Theft Industry Insight

Strengthening Your Microsoft 365 Security: An Enterprise Guide for 2025

Did you make a New Year’s resolution this year? If so, you’re not alone. Lots of...

Business Identity Theft Industry Insight

Navigating Cybersecurity Leadership: Tips for Finding the Right vCISO for Your Organization

In early October, hackers targeted American Water, one of the largest utility pr...

Business Identity Theft Industry Insight

The Anatomy of a Cyber Attack: Lessons from the Front Lines

Here’s a quick story that will send shivers down the spine of every CEO.

Business Identity Theft Industry Insight

The Role of Penetration Testing in Protecting Your Organization

What is Penetration Testing? Businesses can no longer afford to take cybersecuri...

#LifeAtEdge

Meet Travis: edgefi’s Tech Team Lead

Our goal at edgefi is to help our customers build security operations that evolv...

#LifeAtEdge

The Story Behind Edge Networks’ Rebrand to edgefi 

The Story Behind Edge Networks’ Rebrand to edgefi We’re thrilled to have entered...

#LifeAtEdge

Meet Megan: edgefi Welcomes a New Project Coordinator

With all the exciting news in the last few weeks, we’re excited to share that we...

News

Cybersecurity Firm Edge Networks Rebrands After 18 Year History

Innovative Cybersecurity Firm Edge Networks Rebrands as edgefi After 18-Year His...

News

edgefi Wins Emerging Award at the 40th Annual Oregon Tech Awards

edgefi (formally Edge Networks) Wins “Emerging Award” at Oregon Tech Awards Port...

#LifeAtEdge

Sip and Secure: May Happy Hour Recap

Sip and Secure Recap Last week, our local cybersecurity community gathered at th...

#LifeAtEdge

Meet Noah: Edge Welcomes a New Help Desk Analyst

We’re excited to share that Edge Networks is growing! This has been propelled no...

News

Edge Networks: Celebrating Our Nomination for the Technology Company of the Year Award

Edge Networks Announced as a Finalist for Emerging Company of the Year by Techno...

Business Identity Theft Industry Insight

Understanding Identity Theft: Strategies to Secure You and Your Organization

The Rise of Identity Theft Online transactions offer convenience, but they also ...

#LifeAtEdge

Meet Michael: Edge Networks Welcomes a New CISO

At Edge, our journey since 2006 has been about more than just growth—it’s been a...

Industry Insight

The Evolution of GRC (Governance, Risk, and Compliance)

The Evolution of GRC: From Check-the-Box to Strategic Asset In a 2023 report by ...

cybersecurity mission Industry Insight #LifeAtEdge

How to Remediate the Cybersecurity Leadership & Strategy Resource Pain Through a vCISO Program

Mission Possible: How to Remediate the Cybersecurity Leadership & Strategy R...

#LifeAtEdge

Sip and Secure: January Happy Hour Recap

Sip and Secure Recap Last week, we had the pleasure of hosting our Sip and Secur...

Industry Insight

The Essential Guide to Vulnerability Management

Vulnerability Management Working Behind the Scenes Cybersecurity is riddled with...

Article Image
Industry Insight

Why You Should Focus Your Q1 Activities on the “Identify” NIST CSF Category

Why You Should Focus Your Q1 Activities on the “Identify” NIST CSF Category “You...

Industry Insight cybersecurity trends

Top Cybersecurity Trends in 2024 to Look Out For

Uncovering the Top Cybersecurity Trends in 2024 As we welcome a new year, it’s e...

Article Image
Industry Insight Downloads

Exposing Lockbit 3.0: A Proactive Guide to Defense Strategies

LockBit 3.0: Navigating a New Frontier in Cyber Threats When it comes to the lat...

Article Image
News award

Edge Networks Honored as a Top 10% Clutch Champion for 2023

Edge Networks Honored as a Top 10% Clutch Champion for 2023 Edge Networks has be...

Industry Insight #LifeAtEdge Cybersecurity Maturity

The CISO’s Guide to Cybersecurity Maturity

The Journey to Cybersecurity Maturity From executive boardrooms to the heart of ...

News award

Edge Networks Named 2023 Global Award Winner by Clutch

Edge Networks Named 2023 Global Award Winner for Cybersecurity Services by Clutc...

cybersecurity mission Industry Insight #LifeAtEdge

15 Steps to Align Your Cybersecurity Program with Your Company Mission

Mission Possible: How Cybersecurity Can Align with Your Company’s Mission Improv...

cybersecurity #LifeAtEdge cybersecurity tips

Cyber and Cider 2023 Event Recap

The History of Cyber and Cider In October 2022, Edge Networks kicked off its fir...

award #LifeAtEdge

Edge Networks Wins UpCity’s Best of Washington 2023 Award

Edge Networks Wins UpCity’s Best of Washington 2023 Award We are thrilled to ann...

Business Identity Theft Industry Insight
cybersecurity culture Industry Insight

The Human Element: Building a Strong Cybersecurity Culture

The Human Element in Cybersecurity When it comes to cybersecurity, we often focu...

Industry Insight cybersecurity compliance

Navigating Cybersecurity Compliance: A Comprehensive Guide

Understanding Cybersecurity Compliance: Safeguarding Your Business Against Digit...

#LifeAtEdge

Future Leaders Project: Thomas’ Cybersecurity Internship at Edge

The Future Leaders Project The Future Leaders Project is an initiative of Workfo...

News Industry Insight cyber attacks

A Deep Dive into the Recent Casino Cyber Attacks

A Deep Dive into the Recent Casino Cyber Attacks and How to Be Proactive in Your...

Article Image
#LifeAtEdge

Future Leaders Project: Johnny’s Marketing Internship at Edge

Workforce Southwest Washington’s Future Leaders Project The Future Leaders Proje...

Industry Insight Cyber Assessments

What is a Cybersecurity Assessment?

Building a Secure Digital Environment with Cybersecurity Assessments Imagine fin...

Industry Insight Cyber Insurance Checklist wifi

Cyber Insurance Checklist: What to Expect When Applying

Cyber Insurance Checklist: Questions to Expect When Applying The threat of cyber...

Industry Insight

5 Tips for Protecting Personally Identifiable Information (PII)

Protecting Personally Identifiable Information (PII) One thing is clear: protect...

Industry Insight

Public WiFi Security Tips: Always Use a VPN and Anti-Malware

The Ups and Downs of Public WiFi Picture this: You’re at your go-to café, sippin...

Article Image
Industry Insight Downloads

A Guide to Vendor Impersonation Fraud

Protecting Yourself in the Digital World In today’s interconnected digital lands...

Article Image
Industry Insight

3 Steps to Secure Your Company with a Password Manager

Why is a Password Manager so Critical? The average person has 70 to 80 passwords...

News Industry Insight

Passkeys: The Future of Password Security

Passkeys: The Future of Passwords When it comes to digital security, passwords h...

News Industry Insight Data breach

Ask an Expert: History Repeated with Another T-Mobile Data Breach

Ask an Expert: History Repeated with Another T-Mobile Data Breach T-Mobile has b...

Article Image
Industry Insight cybersecurity #LifeAtEdge cybersecurity jobs

3 Skills You Need to Get Hired in Cybersecurity

In light of the recent wave of layoffs, we want to provide as much information a...

Article Image
Industry Insight cybersecurity cybersecurity KPIS

The Top 3 Cybersecurity KPIs Every Business Needs to Track

Key Performance Indicators (KPIs) are an excellent way to measure your team’s su...

Article Image
Industry Insight

Tips for Safer Internet Day 2023

Tuesday, February 7th, 2023 is the 20th anniversary of Safer Internet Day! The m...

Article Image
Industry Insight cybersecurity cybersecurity trends

Cybersecurity Trends To Follow Beyond 2022

As the digital world continues to grow, so does the cyber threat landscape. Ther...

Article Image
Managed IT Services Industry Insight IT outsourcing Managed IT

5 Reasons Outsourcing Your IT Is a Smart Business Decision

In today’s world, businesses need to be able to rely on their technology. When s...

Article Image
cybersecurity #LifeAtEdge cybersecurity tips

Cyber and Cider 2022 Event Recap: A Happy Hour for Local Professionals

The Event In November, Edge Networks held a happy hour for local professionals, ...

Article Image
Industry Insight cybersecurity data breaches

Smart Home Breaches: How to Prevent Them and What to Do If They Happen

It’s no secret that smart homes are becoming more and more popular. For many, a ...

Article Image
Industry Insight

Spyware: The Silent Threat to Your Business

Are you the first line of defense for your business? Do you know what’s going on...

Article Image
Industry Insight

The Importance of Protecting Your Sensitive Information in 2022

As more and more people get on the internet and start sharing information, data ...

Article Image
Human error Industry Insight cybersecurity breach cybersecurity

Human Error in Cybersecurity Breaches

Running a business is difficult work. There are so many factors you need to cons...

Article Image
News cybersecurity

AUGUST 2022: Major Vulnerabilities Found on Apple Devices, Users Urged to Update Software

On Wednesday, August 17th, 2022, Apple released two security reports revealing s...

Article Image
Industry Insight cybersecurity

4 Ways Penetration Testing Can Improve Your IT

You’ve probably heard of penetration testing, but you may not be entirely sure w...

Article Image
Industry Insight cybersecurity

How to Choose the Right VPN Service For Your Business

Your location, IP address, browsing history, and device type are some of the thi...

Article Image
Industry Insight cybersecurity

Everything You Should Know About Password Managers

47% of American adults have had their personal information exposed by cybercrimi...

Article Image
Industry Insight cybersecurity

Cybersecurity: What Is It And Why It’s Important For Your Small Business

Cybersecurity: What Is It And Why It’s Important For Your Small Business

Article Image
News cybersecurity #LifeAtEdge

Edge Networks Ranked #1 in Cybersecurity & IT Firms in Washington

Since 2006, Edge Networks has been providing all-things IT to our clients in ord...

Article Image
Industry Insight cybersecurity

Why You Should Be Using Multi-Factor Authentication (MFA)

Data breaches are at an all-time high. If you’re one of the 56 percent of intern...

Industry Insight cybersecurity

How a Managed IT Service Provider Can Help You Avoid Social Engineering Attacks

A cyber attack on your company could cost you millions of dollars and cause you ...

Article Image
Industry Insight cybersecurity

Server and Network Management Basics

When you set up your own business, the details of the network and servers might ...

Article Image
Industry Insight cybersecurity Downloads

5 Reasons Your Business Needs an Incident Response Plan (+ Free Template!)

Did you know that Americans face a hacker attack every 39 seconds, and 43% of th...

Article Image
Industry Insight cybersecurity

How Your Business Can Save Money by Outsourcing Managed IT

Save Money by Outsourcing Managed IT Running a business in today’s fast-paced la...

Article Image
Industry Insight cybersecurity

6 Tips For Implementing New Technology In Your Business

6 Tips For Implementing New Technology In Your Business

Article Image
Industry Insight cybersecurity

Everything You Should Know About Backing Up Your Data

The essential way to store your information

Article Image
Industry Insight cybersecurity

What do Virtually All Phishing Attacks Have in Common?

How to figure out if an email is genuine or “phish-y”

Article Image
Industry Insight

The Differences Between Data Loss, Data Leak, and Data Breach

The Differences Between Data Loss, Data Leak, and Data Breach

Article Image
Industry Insight cybersecurity

7 Cybersecurity Tips for Small/Medium Businesses

Cybersecurity Tips for Small and Medium Businesses If you run an SMB (a small or...

Article Image
Industry Insight cybersecurity

Do You Know the True Cost of Data Loss?

You Lose More Than Data with Data Loss

Article Image
Industry Insight cybersecurity

Cybersecurity Strategy Series Episode 1: Proactive Technologies

Which Security Solutions Does Your Business Need? It is no secret that technolog...

Article Image
Managed IT Services Industry Insight IT outsourcing Managed IT

The Risks Your Employees are Taking by Using Public Wi-Fi

Could Your Employees be Accidentally Putting Your Cybersecurity at Risk? Whether...

Article Image
Industry Insight cybersecurity

Top Cybersecurity Risks Small Businesses Face in 2022

Small Businesses Should Take Steps to Protect Themselves

Article Image
Industry Insight cybersecurity

Cybersecurity Myths that Could be Putting Your Data at Risk

The Importance of Cybersecurity Awareness

Industry Insight

Most Dangerous Malware Threats in 2022

What Is Malware? Malware, sometimes known as “malicious software,” is a catch-al...

Article Image
Industry Insight

The Risks of Improper Offboarding

Offboarding Incorrectly can Lead to Issues and Security Threats No matter what k...

Article Image
Industry Insight cybersecurity

How to Prevent Internal Threats

How Internal Threats Compromise Businesses, and How To Prevent Them

Article Image
News CMMC Industry Insight

What You Need to Know About CMMC 2.0

Are you CMMC Compliant?

Article Image
News Human error Industry Insight cybersecurity breach cybersecurity
Article Image
Managed IT Services Industry Insight IT Downloads outsourcing Managed IT

The 12 Days of Cybersecurity Christmas

Giving you the Gift of Cybersecurity Awareness this Christmas

Article Image
Industry Insight

A Beginners Guide to Penetration Testing

How Penetration Testing can Improve your Company’s Cybersecurity

Article Image
Industry Insight Downloads

Why You need a “Bring Your Own Device” BYOD Policy + Free Template

With the rise of cloud computing, employees have been able to work more efficien...

Article Image
Industry Insight cybersecurity
Article Image
Industry Insight cloud services cybersecurity Managed IT

Improving Productivity with Cloud Services

Cloud Services: A Game-Changer? A huge goal of any company is to improve product...

Article Image
Industry Insight Downloads

HIPAA Compliance: What Your Company Needs To Know

The basics you should know before the audit

Article Image
antivirus Industry Insight cybersecurity

Replace Your Antivirus with Next-Generation Endpoint Security

Endpoint Security: The Cutting Edge of Protection

Article Image
Industry Insight cybersecurity

How Cyber Liability Insurance Can Protect Your Company From Disaster

Everything You Need To Know About Cyber Liability Insurance

Article Image
Industry Insight cybersecurity data breaches

The Savvy Business Owner’s Guide to Cybersecurity Consulting

Everything you need to know about Cybersecurity Consulting Services

Article Image
Industry Insight

Single Sign-On: A Comprehensive Guide

What Is Single Sign-On Authentication & How Does It Work?

Article Image
Managed IT Services Industry Insight IT outsourcing Managed IT

Why Data Hygiene Matters

Cleaning Up with Data Hygiene Data hygiene often gets lost in the shuffle. After...

Article Image
Industry Insight data loss prevention Data Loss

10 Ways Data Loss Prevention Benefits Your Company

This article was originally published September 2021. Updated April 2024. What i...

Article Image
Industry Insight cybersecurity data breaches

Everything You Need To Know About PCI Compliance For Your Business

PCI Compliance Doesn’t Need to Be an Impossible Task For the longest time, busin...

Article Image
Managed IT Services Industry Insight IT outsourcing Managed IT

3 Ways Software Updates Can Increase Cybersecurity

A Simple Step in Cyber-Attack Prevention Cybersecurity is often a complex undert...

Article Image
Industry Insight Downloads

The Future of Passwords and Password Management

The Best Password Managers to Keep You Protected Passwords have been around for ...

Article Image
News Industry Insight

Understanding PrintNightmare: a Print Spooler Vulnerability

PrintNightmare: Understand and Overcome

Article Image
Industry Insight

5 Ways to Make Cloud Computing Work for You

For many, “the cloud” is a familiar term, although many struggle to describe wha...

Article Image
Industry Insight cybersecurity

Social Engineering: Common Methods, Examples, and Preventative Measures

What is Social Engineering? Social engineering is a strategy that has invaded mu...

Article Image
Industry Insight

Optimize Microsoft 365 For Better Security Without Spending A Dime

Microsoft Office has been around since 1990 & is here to stay. The newest pr...

Article Image
Industry Insight

Phishing 101: A Beginner’s Guide to Today’s Biggest Cybersecurity Threat

In today’s world, email is one of the most used means of communication. In fact,...

Article Image
Industry Insight cybersecurity

Security Measures to Consider as Employees Return to the Office

Best Cybersecurity Practices for Your Employees as They Return to the Office dur...

Article Image
Industry Insight

6 Ransomware Trends All Employees Should Watch For in 2021

Ransomware is an ever-present and worsening problem in today’s society. It’s cru...

Article Image
Industry Insight data breaches

10 Ways To Prevent A Security Breach In The Workplace

Among all the challenges businesses are facing today, cybersecurity is perhaps t...

Article Image
News cybersecurity

Centennial School District Compromised by Ransomware

On the News: Edge Networks Discusses the Centennial School District Cyber Attack...

Article Image
Industry Insight cybersecurity breach cybersecurity

How to Maintain the Cybersecurity of Your Remote Workers

The Sudden Jump to Remote Work: The Need For the Cybersecurity of Your Remote Wo...

Article Image
Industry Insight IT cybersecurity

8 Good Cyber Hygiene Tactics to Keep Your IT Humming

Keep Your IT Humming with These Cyber Hygiene Tactics Maintaining a healthy and ...

Article Image
Industry Insight data loss prevention Data Loss

Data Loss Prevention: How to Protect Your Data When Disaster Strikes

Data Loss Prevention: Preparing for a Rainy Day One of the most terrifying exper...

Article Image
Industry Insight cloud services cybersecurity cloud management

Breaking Down the Cloud: Picking the Right Cloud Management Platform

Aim for the Sky with Application and Cloud Management Over the past decade, we h...

Industry Insight

The Role of Employee Security in Building a Secure & Stable Business Environment

Employee Security Matters: The First Line of Cyber Security Defense When conside...

Industry Insight Device and Inventory Management

4 Things You Need to Consider When Creating an Effective Device and Inventory Management System

Understanding Device and Inventory Management Business process improvement guru,...

Industry Insight cybersecurity compliance

Compliance Mistakes You Don’t Know You’re Making That Can Cost You Thousands

Taking the Fear of Compliance Mistakes out of Regulatory Compliance The phrase “...

News Managed IT Services IT outsourcing Managed IT #LifeAtEdge
Article Image
Industry Insight cybersecurity Downloads

The Five Critical Components Your Cybersecurity Incident Response Plan Must Have

What Is a Cyber Incident Response Plan? According to the National Institute of S...

Article Image
Industry Insight

Make Cybersecurity Part of Your Onboarding and Offboarding

Importance of Cybersecurity in the Employee Onboarding and Offboarding Process M...

Article Image
Industry Insight cybersecurity

How Do I Create a Security Awareness Program – Employee Security Awareness Training

Reducing threats better than a firewall, intrusion detection system, or endpoint...

Industry Insight cybersecurity

Top 3 Tips for Rock-Solid Microsoft Office 365 Security

Microsoft Office 365 Security – Best Practices Microsoft Office 365 is among the...

Industry Insight

Boosting Productivity and Security with Single Sign-On Authentication

Save Time and Hassle with Single Sign-On Authentication (SSO)

Industry Insight cybersecurity Downloads Data breach

Don’t Be the Next Company Sending Out a Notice of Data Breach Letter

Don’t Be the Next Company Sending Out a Notice of Data Breach Letter

Article Image
Industry Insight cybersecurity #LifeAtEdge

Bulk configure handheld scanners Intermec CK3 via CloneNGo

Josh McKinney, chief technology officer with Edge Networks with a tip of the wee...