• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
  • X
  • Facebook
  • YouTube
  • LinkedIn
Support
Screen Connect
Pay Online
SWK logo.

SWK Technologies

Software Solutions & Services

  • Accounting & ERP Software
      • Acumatica Cloud ERP
        • Overview
        • Construction
        • Distribution
        • Field Service
        • Financial Management
        • Manufacturing
        • Professional Services
        • Project Accounting
        • Retail-Commerce
      • Sage Intacct
        • Overview
        • Construction and Real Estate (CRE)
        • Distribution Operations for Sage Intacct
        • Financial Services
        • Healthcare
        • Manufacturing Operations for Sage Intacct
        • Nonprofits
        • Professional Services
        • Sage Intacct Payroll powered by ADP
      • Sage 100
        • Overview
        • Business Intelligence
        • Core Accounting & Financials
        • Distribution
        • Manufacturing
        • Payroll
        • Sage 100 Contractor
      • More Accounting Products
        • QuickBooks
        • Sage 50
        • Sage 300
        • Sage 500
        • Sage BusinessWorks
      • ERP Add-ons
        • ADP Workforce Now
        • Altec
        • Avalara
        • AvidXchange
        • BigCommerce
        • CIMCloud
        • Cloud Hosting
        • DataSelf
        • Fortis
        • FreightPOP
        • Microsoft 365
        • Netstock
        • Ottimate
        • Sage Fixed Assets
        • Sage HRMS
        • Sage Intacct Payroll powered by ADP
        • Savant WMS
        • Scanco
        • ScanForce
        • Solver
        • SPS Commerce
        • Velixo
        • Workforce Go!
      • More ERP Add-ons
        • Bizinsight
        • Concur
        • Crystal Reports
        • Fraxion
        • Fusion RMS
        • FYISoft
        • JobOps
        • KnowledgeSync
        • Lockstep Collect
        • Nectari
        • Pacejet
        • Planning Maestro
        • Sage CRM
        • Sage Intelligence
        • Scissortail HCM
        • Service Pro
        • ShipStation
        • Shopify
        • Starship
        • Sugar CRM
        • Time & Billing Pro
        • Timekeeper
        • True Sky
      • Industries
        • Construction
        • Distribution
        • Financial Services
        • Healthcare
        • Manufacturing
        • Nonprofit
        • Professional Services
        • Retail
  • Managed Cloud Services
      • Managed Services
        • IT Support
        • Cloud Hosting
        • Infrastructure-as-a-Service
        • Managed Cloud Services
        • vCIO
        • Acumatica Infrastructure
      • IT Solutions
        • Backup & Continuity
        • Cybersecurity
        • Email Hosting
        • Microsoft 365 Services
        • Virtualization
  • Consulting & Implementation
    • Business Technology Consulting
    • eCommerce
    • Financing
    • Human Capital Management
    • Managed Cloud & IT Services
    • Partner Program
    • Software Development
    • Software Implementation
  • Resources
    • Help Desk
    • Blog Posts
    • Payments Portal
    • Webinars
    • YouTube Channels
    • Acumatica Resources
    • Sage Intacct Resources
    • Sage 100 Resources
    • IT Resource Pages
  • About
    • About SWK
    • Awards & Recognition
    • Life@SWK
    • Careers
    • Success Stories
    • SWK Gives
  • Contact
    • Contact Us
    • Support
    • Our Locations

Cybersecurity

Home » Cybersecurity » Page 13

A rack of bitcoin mining equipment sitting on a table.

What is Double Blockchain in Cybersecurity?

September 9, 2022 by Hector
Double blockchain and its applications in cybersecurity offer a game-changing business continuity solution that transcends many of the limitations of …
Read moreWhat is Double Blockchain in Cybersecurity?
A pile of us dollar bills on a white background.

Costs of a Cyber Attack for SMBs

August 31, 2022 by Hector
This article will drill down into the particular costs that can result from a cyber attack for SMBs specifically, including both and indirect damages. …
Read moreCosts of a Cyber Attack for SMBs
A laptop computer with a newspaper on it.

SWK Cybersecurity News Recap August 2022

August 22, 2022 by Hector
Check Out Some of the Top Cybersecurity News Stories in August 2022 August 2022 was yet another busy period in the cybersecurity news world, so this …
Read moreSWK Cybersecurity News Recap August 2022
A hand holding a padlock in front of a digital background.

How to Enforce Secure Access in the Cloud – Part 2

August 15, 2022 by Hector
Whereas Part 1 of How to Enforce Secure Access in the Cloud covered solutions, Part 2 of this series will go over the practices that complement the …
Read moreHow to Enforce Secure Access in the Cloud – Part 2
A man working on a machine in a factory.

How to Improve Cybersecurity in Manufacturing

August 8, 2022 by Hector
Cybersecurity in manufacturing is a complex area that can shift significantly depending on where your business serves the market as well as your …
Read moreHow to Improve Cybersecurity in Manufacturing
A man and woman are sitting at a kitchen table while looking at their cell phones.

Learn How to Recover from a Cyber Attack

August 1, 2022 by Hector
Learning how to recover from a cyber attack is a critical business function in the modern digital age of computing, with various reports predicting …
Read moreLearn How to Recover from a Cyber Attack
A group of people working together on a puzzle piece.

Sage Expands ERP Integration with Microsoft

July 27, 2022 by Hector
On July 20, 2022, Sage Group plc announced a partnership expansion with Microsoft that will significantly improve the integration between Sage ERP and …
Read moreSage Expands ERP Integration with Microsoft
A man in a suit reading a newspaper.

SWK Cybersecurity News Recap July 2022

July 22, 2022 by Hector
A Look at Top Cybersecurity News from June – July 2022 June through July 2022 have been yet more eventful months for cybersecurity news, so this SWK …
Read moreSWK Cybersecurity News Recap July 2022
A man is looking at several monitors in front of a computer.

Pen Testing vs Vulnerability Scan vs Security Assessment

July 11, 2022 by Hector
Pen testing (short for “penetration testing”) quite often gets mixed up with a vulnerability scan, and both are used interchangeably for security …
Read morePen Testing vs Vulnerability Scan vs Security Assessment
Three yellow padlocks on a wooden table.

How to Create a Layered Cybersecurity Defense

June 27, 2022 by Hector
Your business needs a layered cybersecurity defense strategy in order to effectively combat modern threats, secure your mission-critical IT assets, …
Read moreHow to Create a Layered Cybersecurity Defense
  • Previous
  • Page 1
  • Interim pages omitted …
  • Page 11
  • Page 12
  • Page 13
  • Page 14
  • Page 15
  • Interim pages omitted …
  • Page 27
  • Next

Sidebar

Recent Posts

  • How Your ERP Software Impacts Tariff Costs
  • How a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth
  • Why Financial Services Firms Need Phishing Defense
  • Acumatica General Ledger Training – Key Tips & Tricks
  • Sage Intacct vs. Sage 500: Best ERP for CFOs and Financial Leaders
  • What is the Relationship Between Cybersecurity and Cyber Insurance? 
  • Guide for Sage Intacct Credit Card Management

Categories

Ready to take the next step?

Contact SWK today to get in touch with one of our experts. We’ll go over your business challenges and unique needs, and see where you can unlock new value from your technology and make your operations run easier.

Get in touch!

Our Latest Posts

Cargo ship "Tokyo Triumph" loaded with shipping containers in various colors, representing international trade and supply chains affected by tariffs impacting manufacturing operations.

How Your ERP Software Impacts Tariff Costs

Read moreHow Your ERP Software Impacts Tariff Costs
Recreational Play Structure

How a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth

Read moreHow a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth
Hands holding an open silver padlock over a laptop keyboard, symbolizing cybersecurity vulnerabilities that phishing attacks exploit in financial services firms

Why Financial Services Firms Need Phishing Defense

Read moreWhy Financial Services Firms Need Phishing Defense

Awards and Accreditations

Top work places in NJ 2020.
Acumatica the Cloud ERP gold certified partner.
The Gold Microsoft partner logo on a black background.
Sage business partner diamond logo.
Dell Technologies Gold Partner
Sage tech partner logo.

Stay in the know!

Subscribe for exclusive ERP, process automation, IT and cybersecurity news.

Twitter
  • Facebook
  • YouTube
  • LinkedIn

Home
About
Contact

Support
Screen Connect
Pay Online
Downloads

SWK logo.

Headquarters:
120 Eagle Rock Ave, Suite 330
East Hanover, NJ 07936

Contact:
info@swktech.com
(877) 979-5462

Copyright © 2025 · SWK Technologies, Inc. · All Rights Reserved · Terms of Use · Privacy Policy

This site uses cookies to collect information about your browsing activities in order to provide you with more relevant content and promotional materials, and help us understand your interests and enhance the site. By continuing to browse this site you agree to the use of cookies. Visit our privacy policy to learn more.I understand