The Royal Flush: IT Risk Assessment Teams Must Have an Ace

Khaled Antar | July 5

Adidas, Panera Bread, Saks 5th Avenue, Under Armor (My Fitness Pal), FedEx, Aetna, VTech, Exactis — What do these companies have in common aside from a well-known brand? They have all reported data breaches in the first half of 2018. This list…

Why You Shouldn’t Be Afraid of a Risk Assessment

Zachary Hill | July 4

Risk assessments can be inherently frightening. They often mean opening up your business…

Using a Risk Assessment as Part of Your Budgeting and Planning Process

Travis Sachse | June 25

Many companies get IT risk assessments simply because it is a regulatory requirement,…

Being Proactive to Manage the Reactive

Andrea DiGiacomo | June 18

When I talk to people about time management and planning their priorities, 8…

Why Root Cause Analysis is King

Jake Jones | June 1

All of us have probably dealt with unwanted plants in our yards at…

Proactive from the Ground Up

Zachary Hill | May 31

Lately at Think|Stack we’ve been excited while discussing something called ‘innovation infrastructure’. innovation: noun — a…

Turning Around a Negative Customer Service Experience

Andrea DiGiacomo | May 30

Last week our team ordered lunch from Panera for one of our all-staff…

The Value of Building Client Relationships

Andrea DiGiacomo | May 30

At Think|Stack, we have four badges which makeup our cultural norms: Family Trust,…

Being Proactive Can Be as Simple as Giving Up a Seat at the Table

Mike Burns | May 30

I think I speak for everyone in the IT Security Community when I…

Finding Understanding in Compliance: Journey Towards the 100%

Gabe McWilliams | May 28

Vulnerability is something we all have to come to terms with, though it…

Defining the Health of System Security and Well-being

Gabe McWilliams | May 28

Clients want to know how their infrastructure is doing — hearing from word of mouth…

Not again… when will people learn?!

Zachary Hill | May 7

Another breach in the news and another moment I face palm. It seems…

Overwhelmed?!?!

Larisa Gelis | May 7

Do you ever feel overwhelmed or stressed at work? I’m always thinking there…

Help! We’ve been compromised!

Khaled Antar | May 3

But, wait we umm.. never finished our Cyber Security Strategy… because you know…

I Don’t Know

Danny Levy | April 30

I don’t know how to do that. I don’t know what you’re asking…

Building a Culture of Security

Andrea DiGiacomo | April 26

We all hear about cyber security a LOT. It’s constantly in the news,…

We don’t take Cybersecurity Seriously Enough

Mike Burns | April 26

Lack of sharing breach Information - Every day the news is packed with…

Selling Cybersecurity

Joe Ireland | April 26

I attended an event last night where an Army General gave a talk…

IT Support: Every Question is a Security Question

Jake Jones | April 26

In every industry there are times when you realize the landscape is completely…

The Total Cost of a Cyber Security Attack

Travis Sachse | April 25

As of CFO, you are always looking at the potential return on any…

We are not taking cyber security seriously enough

Chris Sachse | April 25

I have the privilege of being a member of a great peer advisory…

What Do You Do, Think|Stack?

Chris Sachse | April 20

Last week, while attending an event on the west coast, I was arriving…

Preventing Lateral Movement Using Network Access Groups

Mike Burns | April 19

At least once a week I get on a rant about network segmentation…

My 4 Days at Harvard

Andrea DiGiacomo | April 15

I was lucky enough recently to spend a few days at Harvard Business…

…Always Be Prepared to Throw the Plan Out the Window

Andrea DiGiacomo | April 15

In a previous post of mine, I talked about all the reasons it’s…

Always Start with a Plan…

Andrea DiGiacomo | April 15

This is part 1 of 2— Always start projects with a plan. Even…

GDPR and How It May Impact You

Chris Sachse | April 12

General Data Protection Regulation. Lately we have been fielding a lot of calls…

TS Tech Talk — OpenDNS as part of an holistic defense against Ransomware/Malware

Travis Sachse | March 20

At Think|Stack, we have a group in our internal message system where non-technical…

Dude, Where’s my Phone?, ask AirWatch

Mike Burns | March 8

Looking outside at 6:30 AM to see 9 inches of snow resting on…

Sophos Antivirus Root Cause Analysis Tool

John Van | March 7

In the past, Antivirus software was relatively simple and did a decent job…

The Case for Monitoring Internal Network Activity

Mike Burns | March 3

As a Security Engineer, you are always looking to get your hands on…

What I Learned about Ransomware

Andrea DiGiacomo | February 28

Like many people I’ve heard about Ransomware and had a surface understanding about…

Sometimes You’re the Hammer

Jake Jones | February 28

Have you ever heard the saying Sometimes you’re the hammer, sometimes you’re the…

Cyber Vigilance Required by HR Departments

Chris Sachse | February 27

This morning I came into the office and was greeted by our human…

Why Training and Certification is Important

Sean Meadows | February 26

“The only thing more dangerous than someone who doesn’t know what they are…

Who controls the PC? You or the Malware?

Alex Welkner | February 16

The worst feeling when working on a PC is that moment where you…

You’re a sales person with no IT background. How do you keep up?

Joe Ireland | February 12

First off, if you don’t have some underlying interest or curiosity in technology…

SWAT Team

Chris Sachse | February 9

Do you have a SWAT team at your company?…

Customer Service Through Process

Jake Jones | February 1

When you mention process a lot of people are immediately turned off. It…

Why Invest in a Project Management Program

Andrea DiGiacomo | January 29

Recently, I was on a client check-in call with our account management team…

Finding Balance Before the Crockpot Short

Chris Sachse | January 26

2 years ago, I boarded a red eye from Seattle on my way…

MSP: Managing Vendors During Spectre and Meltdown

Mike Burns | January 10

At Think|Stack, we have a un-official “Preferred Vendors” list. These are tools and…

Peering Behind the Curtain of Security Events at Think|Stack

Chris Sachse | January 6

Over the past few months we have been quite busy with cyber threat…

Running the Intel Meltdown Detection Tool

Mike Burns | January 5

All the reading that I’ve been doing over the past 2 days left…

Meltdown and Spectre As It Pertains to the Cloud

Zach Hill | January 4

Yesterday information began to trickle out about the Meltdown and Spectre vulnerabilities. At…

’Twas the Night Before Christmas

Khaled Antar | December 24

’Twas the night before Christmas, when all thro’ the Stack, Not a device…