Technology Archives | Interlaced

Technology Articles

How to Build an InfoSec Program: Cyber Series Part 2

How to Build an InfoSec Program: Cyber Series Part 2

Information Security is intimidating, and as a result, many people or companies take the path of avoidance or complacency. Today we want to take it back to the basics around what it takes to build an information security program, or as it is more commonly referred to an InfoSec Program.

Your Guide to Cybersecurity Acronyms: Cyber Series Part 1

Your Guide to Cybersecurity Acronyms: Cyber Series Part 1

Are you lost in a sea of cybersecurity acronyms? Have you been asked if your company utilizes EDR, SOC or SIEM but had no clue what that actually meant? If you find yourself nodding your head at the last two sentences, this blog post is for you.

How to Understand URLs to Identify Phishing

How to Understand URLs to Identify Phishing

Despite an ever-changing digital world, email remains one of the most popular forms of communication. As a result, cybercriminals have come up with new and creative ways to use email to scam you out of personal or customer-sensitive information. In this post, we cover how to prevent phishing scams by learning how to read URLs.

Remote IT Management and Culture

Remote IT Management and Culture

With remote work here to stay, business leaders need to pay particular attention to how their IT programs are impacting company culture. In this article, we’ll explore the role of technology in remote company culture.