MacguyverTechHow Can You Persuade Your Employees to Embrace Cybersecurity?In the course of penning our cybersecurity blogs, we have regularly compared your business to a castle. To embrace that analogy again, even…3 min read·Jul 12, 2023----
MacguyverTechCatching Hackers with Honeypots: What is a Honeypot?A.A. Milne’s Winnie the Pooh has long been known of a symbol of kindness (and even Taoism) displayed through simple goodness…3 min read·Jun 21, 2023----
MacguyverTechWhat is Volt Typhoon, and Should You Be Concerned?Last week, Volt Typhoon targeted critical infrastructure groups in the US. Somehow, this has absolutely nothing to do with professional…2 min read·Jun 7, 2023----
MacguyverTechWhat Is Red Teaming, and Why is it Important?In the 1980s, the world feared all things Red. Red represented Communism, the Red Army, Ivan Drago, and movies like Red Dawn. These fears…2 min read·Apr 26, 2023----
MacguyverTechWhat’s the Difference between Offensive and Defensive Cybersecurity?If you’ve been paying attention to anything involving computers or the Internet recently, you know cybersecurity is at the forefront of…2 min read·Apr 13, 2023----
MacguyverTechWhy is Using the Latest Programming Languages and Frameworks Important?From BASIC, to Pascal, to C and C++, to Python, to PHP and JavaScript, computer languages have adapted and been assimilated into more…3 min read·Apr 6, 2023----
MacguyverTechIs Your “Off the Shelf” Software Holding You Back?Software development has come a long way. Custom field generation, compatibility with other programs, and regular updates to improve…3 min read·Mar 14, 2023----
MacguyverTechWhat is CMMC, and Why is it Important?Cybersecurity is one of the more daunting and closely-monitored fields in the world. There are challenges and obstacles that didn’t exist…3 min read·Mar 8, 2023----