top of page

The Burk Blog


Watch Out for These Phishing and Social Engineering Techniques
What should concern you most is that hackers are targeting your employees. One mistake by an untrained employee can have serious financial and reputational damage. That’s why you should make awareness your first line of defense.

Noah Parker
Jun 192 min read


Social Engineering Attacks: The Secret Behind Why They Work
You might recognize terms like phishing, baiting and tailgating. Each one uses a slightly different approach, but the objective is the same: to manipulate someone’s response.

Michael Trotter-Lawson
Jun 63 min read


Why Cloud Security Matters for Your Business
Let’s be blunt. Cybercriminals don’t care how small or big you are. They only care about one thing: access. And if your cloud environment gives them an easy way in, they’ll take it without hesitation.

Michael Trotter-Lawson
May 153 min read


Protecting Your Business in the Cloud: What’s Your Role?
Business owners often have this misconception that once their data is in the cloud, it’s fully protected by the cloud service provider. But that’s not quite how it works...it’s more of a team effort, and you have a crucial role to play.

Noah Parker
May 12 min read


The Hidden Costs of Reactive IT: Why a Proactive Approach Is Worth the Investment
The cost of reactive IT: unplanned downtime, lost revenue and unnecessary frustration.

Michael Trotter-Lawson
Apr 43 min read


Top 4 Challenges to Achieving Cyber Resilience and How to Overcome Them
Achieving cyber resilience comes with a unique set of challenges, but first, let's understand: why implement cyber resilience?

Noah Parker
Mar 202 min read


A Deep Dive Into the Six Elements of Cyber Resilience
The reality of facing a cyberattack isn’t a matter of if but when. That’s where cyber resilience comes into play...

Tyler Rasnake
Mar 63 min read


Third-Party Risks: How You Can Protect Your Business
Sometimes, 3rd-party relationships get tested when a cybersecurity incident at the vendor end snowballs into a major issue for you.

Tyler Rasnake
Feb 203 min read


How IT Service Providers Can Help Manage Your Third-Party Risks
Running a business requires reliance on multiple external partners, but each third party introduces risks...

Michael Trotter-Lawson
Feb 62 min read


Common Risk Assessment Myths That Every Business Owner Needs to Know
When it comes to IT risk assessments, business owners have several misconceptions that leave them vulnerable.

Noah Parker
Nov 28, 20243 min read


Risk Assessments: Your Business’s Pitstop for Growth and Security
Risk assessments are important for identifying risks and maintaining asset safety and efficiency to keep your business at its peak.

Michael Trotter-Lawson
Nov 18, 20242 min read


Protect Your Business from Within: Defending Against Insider Threats
You might be thinking that your business is protected from cyberthreats, but are you equally protected against internal threats?

Tyler Rasnake
Oct 10, 20243 min read


CrowdStrike Outage: The Aftermath
Much has been said already about the CrowdStrike update-related outage, but it's importance to cybersecurity cannot be understated.

Ben Lawson
Jul 26, 20244 min read


Need More Reliable IT Services for Your Business?
Let's show you how an exceptional IT service provider works hard to ensure you achieve your business goals.

Noah Parker
Jul 19, 20242 min read


How Cybercriminals Use AI to Power Their Attacks
Hackers are using artificial intelligence (AI) to launch sophisticated cyberattacks to steal your data and disrupt business operations.

Michael Trotter-Lawson
Jun 6, 20242 min read


Top 5 Threats IoT Devices Pose to Data Protection & Privacy
Learn about the common IoT vulnerabilities and the top five threats you need to keep an eye out for.

Michael Trotter-Lawson
Apr 4, 20242 min read


Bolster Cyber Defenses With Routine Security Tests
Understand and address cyber threats through proactive measures, such as routine security scans and network testing.

Michael Trotter-Lawson
Feb 15, 20242 min read


Tackling the Hidden Challenges of Network Monitoring
It’s crucial to proactively identify issues and optimize performance through continuous network security monitoring.

Michael Trotter-Lawson
Feb 1, 20243 min read


How Effectively Managing Risk Bolsters Cyber Defenses
There’s a powerful strategy that can help address your organization’s most critical security gaps — comprehensive cyber risk management.

Michael Trotter-Lawson
Dec 21, 20233 min read


How to Achieve Strategic Cyber Risk Management With NIST CSF
Learn the core principles of cyber risk management and show you how integrating it with a security framework will aid your business.

Michael Trotter-Lawson
Dec 7, 20232 min read
bottom of page