top of page

The Burk Blog


Tyler Rasnake
Mar 63 min read
A Deep Dive Into the Six Elements of Cyber Resilience
The reality of facing a cyberattack isn’t a matter of if but when. That’s where cyber resilience comes into play...
0
0


Tyler Rasnake
Feb 203 min read
Third-Party Risks: How You Can Protect Your Business
Sometimes, 3rd-party relationships get tested when a cybersecurity incident at the vendor end snowballs into a major issue for you.
1
0


Michael Trotter-Lawson
Feb 62 min read
How IT Service Providers Can Help Manage Your Third-Party Risks
Running a business requires reliance on multiple external partners, but each third party introduces risks...
2
0

Noah Parker
Nov 28, 20243 min read
Common Risk Assessment Myths That Every Business Owner Needs to Know
When it comes to IT risk assessments, business owners have several misconceptions that leave them vulnerable.
1
0


Michael Trotter-Lawson
Nov 18, 20242 min read
Risk Assessments: Your Business’s Pitstop for Growth and Security
Risk assessments are important for identifying risks and maintaining asset safety and efficiency to keep your business at its peak.
2
0


Tyler Rasnake
Oct 10, 20243 min read
Protect Your Business from Within: Defending Against Insider Threats
You might be thinking that your business is protected from cyberthreats, but are you equally protected against internal threats?
2
0


Ben Lawson
Jul 26, 20244 min read
CrowdStrike Outage: The Aftermath
Much has been said already about the CrowdStrike update-related outage, but it's importance to cybersecurity cannot be understated.
5
0


Noah Parker
Jul 19, 20242 min read
Need More Reliable IT Services for Your Business?
Let's show you how an exceptional IT service provider works hard to ensure you achieve your business goals.
8
0


Michael Trotter-Lawson
Jun 6, 20242 min read
How Cybercriminals Use AI to Power Their Attacks
Hackers are using artificial intelligence (AI) to launch sophisticated cyberattacks to steal your data and disrupt business operations.
2
0


Michael Trotter-Lawson
Apr 4, 20242 min read
Top 5 Threats IoT Devices Pose to Data Protection & Privacy
Learn about the common IoT vulnerabilities and the top five threats you need to keep an eye out for.
2
0


Michael Trotter-Lawson
Feb 15, 20242 min read
Bolster Cyber Defenses With Routine Security Tests
Understand and address cyber threats through proactive measures, such as routine security scans and network testing.
1
0


Michael Trotter-Lawson
Feb 1, 20243 min read
Tackling the Hidden Challenges of Network Monitoring
It’s crucial to proactively identify issues and optimize performance through continuous network security monitoring.
1
0


Michael Trotter-Lawson
Dec 21, 20233 min read
How Effectively Managing Risk Bolsters Cyber Defenses
There’s a powerful strategy that can help address your organization’s most critical security gaps — comprehensive cyber risk management.
2
0


Michael Trotter-Lawson
Dec 7, 20232 min read
How to Achieve Strategic Cyber Risk Management With NIST CSF
Learn the core principles of cyber risk management and show you how integrating it with a security framework will aid your business.
1
0


Michael Trotter-Lawson
Oct 16, 20232 min read
How Social Media Misuse Can Harm Your Business
Explore the dangers associated with social media and share practical tips to safeguard your organization’s reputation.
0
0


Michael Trotter-Lawson
Oct 3, 20233 min read
A Deep Dive Into Phishing Scams
Learn the intent behind phishing emails, the various types of phishing attacks, and most importantly, how you can secure your business.
0
0


Michael Trotter-Lawson
Sep 12, 20233 min read
Four Ways Disasters Fuel Cyberattacks
Disaster preparedness should be a top priority for your business, not only for physical resilience but also your digital defenses.
0
0


Michael Trotter-Lawson
Aug 3, 20232 min read
Don’t Sabotage Employee Cybersecurity Training With These Common Mistakes
By recognizing vulnerabilities, we can proactively mitigate risks and empower your workforce to actively defend against cyberattacks.
0
0


Michael Trotter-Lawson
Jul 20, 20233 min read
Why Your Business Needs to Beef Up Employee Security Awareness
Strengthening employee security awareness is paramount in safeguarding your business.
0
0


Michael Trotter-Lawson
Jul 6, 20233 min read
What to Look for in an Outsourced IT Partner
By clearly understanding what to look for, you can make an informed decision and find a partner that aligns with your organization’s goals.
2
0
bottom of page