Security Videos & Guides - CCB Technology IT services that move your business forward Fri, 12 Sep 2025 11:15:07 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.3 https://ccbtechnology.com/wp-content/uploads/2021/06/cropped-4-1-32x32.png Security Videos & Guides - CCB Technology 32 32 Ye Olde Guide to Email Security https://ccbtechnology.com/asset/email-security-guide/ Wed, 30 Jul 2025 17:16:03 +0000 https://ccbtechnology.com/?post_type=asset_type&p=175253 Infographic: Ye Olde Guide to Email Security Explore email security through a medieval lens. This guide breaks down phishing protection, email gateway security, SIEM for […]

The post Ye Olde Guide to Email Security appeared first on CCB Technology.

]]>

Infographic: Ye Olde Guide to Email Security

Explore email security through a medieval lens. This guide breaks down phishing protection, email gateway security, SIEM for Microsoft 365, MDR, backups, and business continuity – using a castle analogy to make cybersecurity simple, engaging, and memorable.
Want more information? click here

Need Help Securing Your Inbox?

We’re here to help – let’s talk email security!

The post Ye Olde Guide to Email Security appeared first on CCB Technology.

]]>
Key Considerations for Secure Copilot Adoption https://ccbtechnology.com/asset/key-considerations-for-secure-copilot-adoption/ Thu, 24 Jul 2025 21:58:23 +0000 https://ccbtechnology.com/?post_type=asset_type&p=175248 Checklist: Considerations for Secure Copilot Adoption Want more information? click here How can we help you? (Please select all that apply)

The post Key Considerations for Secure Copilot Adoption appeared first on CCB Technology.

]]>

Checklist: Considerations for Secure Copilot Adoption

Want more information? click here

How can we help you?

(Please select all that apply)

The post Key Considerations for Secure Copilot Adoption appeared first on CCB Technology.

]]>
How AI Can Help & Hinder Security Efforts https://ccbtechnology.com/asset/dual-nature-of-ai/ Tue, 21 Jan 2025 18:46:45 +0000 https://ccbtechnology.com/?post_type=asset_type&p=174925 Video: The Dual Nature of AI – How AI Can Help & Hinder Security Efforts In this session, we’ll explore the impact and enhancement of […]

The post How AI Can Help & Hinder Security Efforts appeared first on CCB Technology.

]]>

Video: The Dual Nature of AI – How AI Can Help & Hinder Security Efforts

In this session, we’ll explore the impact and enhancement of AI in modern security tools, highlighting the benefits provided for detecting and preventing cyber threats in ways impossible for human agents to manage alone. We will examine the current landscape of AI technologies and their future potential, including their role in sophisticated targeted attacks.


Additionally, we’ll explore the evolution of the tools and techniques employed by security professionals and attackers alike. Our discussion will provide evidenced insights into some of the areas threat actors are currently concentrating on and what measures are being tested to combat their development. 

How can we help you?

(Please select all that apply)

The post How AI Can Help & Hinder Security Efforts appeared first on CCB Technology.

]]>
Tech Strategy Summit 2024: The Future of AI & Security https://ccbtechnology.com/asset/tech-strategy-summit-2024/ Wed, 18 Dec 2024 20:22:45 +0000 https://ccbtechnology.com/?post_type=asset_type&p=174865 Full Access Pass 2024 Tech Strategy Summit AI is weaving its intricate web deeper into the fabric of our daily lives and will soon become […]

The post Tech Strategy Summit 2024: The Future of AI & Security appeared first on CCB Technology.

]]>

Full Access Pass

2024 Tech Strategy Summit

AI is weaving its intricate web deeper into the fabric of our daily lives and will soon become an indispensable tool in the workplace.

But do we truly comprehend what its capabilities are or what we may be relinquishing by letting it in?

Check out the recordings from this year’s summit that was crafted for business leaders and IT professionals looking to dive into the world of artificial intelligence with a special focus on Microsoft Copilot.

What you’ll learn:
  • How to effectively use Microsoft Copilot
  • How to build an effective AI business strategy
  • How to present IT strategies & secure executive approval
Access the the FULL Summit for only $14.99!

The post Tech Strategy Summit 2024: The Future of AI & Security appeared first on CCB Technology.

]]>
The Guide to Creating a Culture of Security https://ccbtechnology.com/asset/creating-a-culture-of-security/ Tue, 06 Dec 2022 17:39:04 +0000 https://ccbtechnology.com/?post_type=asset_type&p=170331 Ebook: The Guide to Creating a Culture of Security Regardless of your organization’s size, keeping security top of mind is the best way to stay […]

The post The Guide to Creating a Culture of Security appeared first on CCB Technology.

]]>

Ebook: The Guide to Creating a Culture of Security

Regardless of your organization’s size, keeping security top of mind is the best way to stay ahead of cybercriminals – and it all starts with your end users. This guide will help you emphasize the shared responsibility of keeping your business protected.
Want more information? click here

How can we help you?

(Please select all that apply)

The post The Guide to Creating a Culture of Security appeared first on CCB Technology.

]]>
Making Compliance as Painless as Possible https://ccbtechnology.com/asset/making-compliance-painless/ Fri, 18 Nov 2022 19:56:58 +0000 https://ccbtechnology.com/?post_type=asset_type&p=170301 Video: Making Compliance as Painless as Possible Is your organization continually scrambling to meet the increase in security and privacy requirements while trying to support […]

The post Making Compliance as Painless as Possible appeared first on CCB Technology.

]]>

Video: Making Compliance as Painless as Possible

Is your organization continually scrambling to meet the increase in security and privacy requirements while trying to support and maintain critical business systems? New requirements can involve new skill sets, procurement of solutions, additional resources, and company buy-in for adopting new practices.

You’ll learn:
  • How risk assessments will help prioritize your efforts
  • How to develop strategic, risk-focused roadmaps
  • How a compliance playbook can be effective

How can we help you?

(Please select all that apply)

The post Making Compliance as Painless as Possible appeared first on CCB Technology.

]]>
How and Why Hackers Hack and How to Defend Against Them https://ccbtechnology.com/asset/how-and-why-hackers-hack/ Fri, 18 Nov 2022 19:20:51 +0000 https://ccbtechnology.com/?post_type=asset_type&p=170280 Video: How and Why Hackers Hack and How to Defend Against Them Understanding why cyberattacks happen is an important first step in protecting your business. […]

The post How and Why Hackers Hack and How to Defend Against Them appeared first on CCB Technology.

]]>

Video: How and Why Hackers Hack and How to Defend Against Them

Understanding why cyberattacks happen is an important first step in protecting your business. At CCB Technology, we look at the real reasons behind these threats and the techniques attackers rely on, from malware to attempts at bypassing multi-factor authentication (MFA). With insights from cybersecurity expert Roger Grimes, we explain how these methods work in practice and why awareness matters. When you understand how criminals operate, you can take smarter actions to reduce risk and strengthen your overall security posture.

The big takeaway is that most attacks start with simple tricks like phishing emails or fake texts. Slowing down before clicking a link, keeping software updated, and using tools like MFA and strong passwords can make all the difference. It’s also not just up to IT—leaders across the business need to be part of the conversation so security decisions actually work in real-world situations.

At CCB Technology, we make IT security and support easy to manage. Our team helps you identify gaps, recommend solutions, and keep your systems resilient against evolving threats. We also provide resources to keep you up to date with the latest trends and tools. Whether you want to improve day-to-day collaboration or safeguard your business long-term, we’re here to provide straightforward guidance that protects and empowers your organization.

You’ll learn:
  • Key security practices to implement in your business
  • How to lower your risk of becoming a cyber victim
  • How hackers are finding ways to get around MFA

How can we help you?

(Please select all that apply)

The post How and Why Hackers Hack and How to Defend Against Them appeared first on CCB Technology.

]]>
6 Cybersecurity Decisions IT Pros Should Never Make Alone https://ccbtechnology.com/asset/cybersecurity-decisions-to-never-make-alone/ Mon, 14 Nov 2022 17:14:25 +0000 https://ccbtechnology.com/?post_type=asset_type&p=170254 Video: 6 Cybersecurity Decisions IT Pros Should Never Make Alone Watch our video, 6 Cybersecurity Decisions IT Pros Should Never Make Alone, hosted by Logan […]

The post 6 Cybersecurity Decisions IT Pros Should Never Make Alone appeared first on CCB Technology.

]]>

Video: 6 Cybersecurity Decisions IT Pros Should Never Make Alone

Watch our video, 6 Cybersecurity Decisions IT Pros Should Never Make Alone, hosted by Logan McCoy, President of CCB Technology. He’s joined by Dave Friske, an IT leader with decades of experience, and Byron from the FBI’s Milwaukee Cyber Squad. Together, they explore the six key security decisions businesses often face and explain why these choices should never fall on IT alone. By bringing executives, finance teams, and IT leaders together, companies can make smarter, well-rounded decisions that protect both operations and data.

The discussion covers practical areas such as developing a full business continuity plan, prioritizing which systems to restore first, setting realistic recovery expectations, and agreeing on how incidents will be communicated internally and externally. The panel also tackles the tough question of whether to pay ransoms, pointing out that these choices should be made in advance and with executive involvement. Beyond the big decisions, they share practical steps—like using multi-factor authentication (MFA), testing backups regularly, patching systems promptly, and training staff to spot phishing attempts—that significantly reduce risks for any size of organization.

At CCB Technology, we help businesses turn these conversations into action. Our team reviews your setup, identifies areas that need attention, and recommends solutions that balance security with business goals. We keep the process simple and tailored to your needs, ensuring you’re prepared for both insurer requirements and real-world threats. With the right plan in place, your organization can stay secure, resilient, and focused on growth.

You’ll learn:
  • 6 Key areas to focus on in your cybersecurity
  • Why internal collaboration is essential for success
  • Questions you should be asking about your IT security

How can we help you?

(Please select all that apply)

The post 6 Cybersecurity Decisions IT Pros Should Never Make Alone appeared first on CCB Technology.

]]>
Things to Know About Cyber Insurance https://ccbtechnology.com/asset/things-to-know-about-cyber-insurance/ Wed, 05 Oct 2022 17:29:34 +0000 https://ccbtechnology.com/?post_type=asset_type&p=170135 Video: Things You Should Know About Cyber Insurance Watch our video, Things You Should Know About Cyber Insurance, where experts from CCB Technology, WatchGuard Technologies, […]

The post Things to Know About Cyber Insurance appeared first on CCB Technology.

]]>

Video: Things You Should Know About Cyber Insurance

Watch our video, Things You Should Know About Cyber Insurance, where experts from CCB Technology, WatchGuard Technologies, and Johnson Insurance share real-world examples, current trends, and the security measures insurers now expect. Hosted by Logan McCoy, the discussion covers why multi-factor authentication (MFA) is becoming a must-have, how small businesses are increasingly targeted, and the practical steps you can take to protect your organization.

Cyber insurance is more than just a financial backup. It’s designed to help your business recover from the impact of a cyber-attack — but getting the right cover means meeting certain requirements. Insurers often look for safeguards like MFA, strong firewalls, regular security checks, and staff training. Meeting these standards early not only strengthens your defences but can also improve your chances of securing comprehensive cover at a competitive rate.

Even if you don’t handle payment data or work in healthcare, your business still holds valuable client and employee information that could be at risk. A single breach can be costly, both financially and reputationally, so being proactive with security is essential.

At CCB Technology, we keep the process simple. We review your setup, identify any gaps, and recommend practical improvements so you’re well-prepared for both insurer requirements and real-world threats.

How can we help you?

(Please select all that apply)

The post Things to Know About Cyber Insurance appeared first on CCB Technology.

]]>
Cyber Liability Insurance – What You Need to Know https://ccbtechnology.com/asset/cyber-insurance-checklist/ Thu, 28 Jul 2022 19:14:06 +0000 https://ccbtechnology.com/?post_type=asset_type&p=169398 Checklist: Cyber Liability Insurance – What You Need to Know Cyberattacks are rising fast, and small to mid-sized businesses are among the most frequent targets. […]

The post Cyber Liability Insurance – What You Need to Know appeared first on CCB Technology.

]]>

Checklist: Cyber Liability Insurance – What You Need to Know

Cyberattacks are rising fast, and small to mid-sized businesses are among the most frequent targets. General business insurance doesn’t cover the financial and reputational damage caused by these incidents, which is why cyber liability insurance has become essential. Our guide, Checklist: Cyber Liability Insurance – What You Need to Know, breaks down the realities of today’s risks — from ransomware and fraud to business disruption and legal costs — and explains what it takes to get the right protection in place.

The guide outlines what insurance typically covers, what influences policy costs, and what you need to qualify for coverage. You’ll find practical information on areas like customer data protection, system backups, disaster recovery, and compliance requirements. It also highlights why insurers are demanding stronger security measures such as multi-factor authentication (MFA) and risk assessments before granting coverage. Reading through the guide gives you a clear picture of the steps your business should take to stay protected and prepared.

At CCB Technology, we tailor IT solutions to your business goals, ensuring your digital tools work effectively for your team. Whether you’re upgrading your current setup or exploring new features, our experts are ready to guide you through the process and answer your questions. We also share valuable resources which provide updates on IT strategies and services for businesses. Join the many professionals who trust CCB Technology for their IT needs, and contact us today to see how we can help you achieve seamless, productive virtual meetings.
Want more information? click here

How can we help you?

(Please select all that apply)

The post Cyber Liability Insurance – What You Need to Know appeared first on CCB Technology.

]]>