Cybersecurity

Tuesday, 29 November 2022

Empowered Chats: Network Segmentation

Written by The Rehmann Team

  Organizations are faced with operational challenges every day, from navigating supply chain issues and finding the right people to staying on top of cybersecurity. With so many opportunities for attackers to get into your organization, equipping your organization with tools to stay secure is essential. Network segmentation is an important, proactive step to take in your cybersecurity planning. We sat down with Justin Vriesman, senior systems engineer with Rehmann Technology Solutions, to learn more about the importance of network segmentation...

Published in Cybersecurity
Monday, 07 November 2022

When In-House IT is Not Enough

Written by Adam Lewan

Welcome to Industry 4.0.— aka the Fourth Industrial Revolution — a new way and world of work, where AI, APIs, IoT, IT, and OT converge, and innumerable amounts of data (and, clearly, acronyms) are revolutionizing the way you manufacture, improve, and distribute your products and services. How ready — and protected — is your company?..

Published in Cybersecurity
Thursday, 03 November 2022

Empowered Chats: Outsourcing IT & Industry 4.0

Written by The Rehmann Team

  Outsourcing continues to be a hot organizational trend in 2022. According to a recent study from customerlink.com, 59% of U.S...

Published in Cybersecurity
Friday, 21 October 2022

2022 Cybersecurity Awareness Month: See Yourself in Cyber

Written by Mark Spaak, VCIO, VCISO, CISSP, Senior Manager of Security Solutions

Mark Spaak, VCIO, VCISO, CISSP, Senior Manager of Security Solutions   The month of October presents a lot of change around us, with the season’s bursting of tree colors and traditional autumn activities. Since 2004, October has been declared Cybersecurity Awareness Month, bringing special attention and focus to an important topic that affects businesses and individuals alike. Each October, attention is dedicated to a cybersecurity topic. This year, the Cybersecurity and Infrastructure Security Agency (CISA) is focusing on the people component with the theme “See Yourself in Cyber...

Published in Cybersecurity
Friday, 21 October 2022

When In-House IT is Not Enough: 5 benefits your organization will experience by outsourcing technology services

Written by Adam Lewan, Business Development Executive for Technology Solutions

Welcome to Industry 4.0.— aka the Fourth Industrial Revolution — a new way and world of work, where AI, APIs, IoT, IT, and OT converge, and innumerable amounts of data (and, clearly, acronyms) are revolutionizing the way you manufacture, improve, and distribute your products and services. How ready — and protected — is your company?..

Published in Cybersecurity
Tuesday, 04 October 2022

Empowered Chats: CyberReady

Written by The Rehmann Team

  Cybersecurity is a business risk that requires year-round attention. However, this is easier said than done, and if you’re like many businesses whose IT teams are bogged down with necessary day-to-day operations, your cybersecurity strategy may be lacking the attention it deserves. Rehmann has developed our CyberReady process to help businesses feel empowered about their cybersecurity strategy again. This five-step, four-workshop process will provide your business with one solid cybersecurity plan ready for implementation...

Published in Cybersecurity
Tuesday, 27 September 2022

Seven Must-Know Cybersecurity Policies

Written by By Paul Kennedy, CISA, CISSP, vCISO

  By Paul Kennedy, CISA, CISSP, vCISO   This is the fifth article in a series focused on the building blocks of a solid and strong cybersecurity plan. Learn more about Rehmann’s CyberReady program and read the other articles in this series here. Organizations benefit from thoughtful, comprehensive policies. For instance, well-defined human resources policies contribute greatly to organizational culture...

Published in Cybersecurity
Tuesday, 27 September 2022

Cybersecurity Expertise is Invaluable

Written by By Paul Kennedy, CISA, CISSP, vCISO

  By Paul Kennedy, CISA, CISSP, vCISO   This is the fourth article in a series focused on the building blocks of a solid and strong cybersecurity plan. Learn more about Rehmann’s CyberReady program and read the other articles in this series here. Have you ever found yourself in a scenario where you know what you want to do, you know what results you want, but you are not equipped or even sure how to do it? This often happens when considering cybersecurity...

Published in Cybersecurity
Tuesday, 27 September 2022

Security Customized for Your Organization

Written by By Paul Kennedy, CISA, CISSP, vCISO

  By Paul Kennedy, CISA, CISSP, vCISO   This is the third article in a series focused on the building blocks of a solid and strong cybersecurity plan. Learn more about Rehmann’s CyberReady program and read the other articles in this series here. Too often we assume adverse events like bad weather or natural disasters won’t affect us. We think others are in danger, not us...

Published in Cybersecurity
Tuesday, 27 September 2022

Prioritize What You Protect

Written by By Paul Kennedy, CISA, CISSP, vCISO

  By Paul Kennedy, CISA, CISSP, vCISO   This is the second article in a series focused on the building blocks of a solid and strong cybersecurity plan. Learn more about Rehmann’s CyberReady program and read the other articles in this series here. Cybersecurity vulnerabilities can pop up at any time, and you may not even know it. That’s especially true with organizational growth and new people...

Published in Cybersecurity
Page 1 of 5

Meet The Rehmann Team

Start typing a name ...
Searching for "{{nameQuery}}"...
Start typing an experience ...
Searching for "{{experienceQuery}}"...
Start typing a location ...
Searching for "{{locationQuery}}"...
Or view a list of team members

get rehmann expertise to drive your business in your inbox every week