Security best practices

Protect Your Business from Cyber-Attacks

With nearly 4,000 cyber attacks hitting small businesses every day, Hogan Consulting Group understands the critical importance of cyber security.
Fortunately for solo entrepreneurs like Bryce McDonald, Microsoft takes cyber security very seriously. #Office365 delivers multiple layers of security, including a 24/7 approach to threat prevention and detection, that work together to protect his business emails and data. Physical access to Microsoft datacenters is monitored and restricted, and all data is stored in regional datacenters.
So no matter where Bryce goes, he takes peace of mind with him–knowing his business and livelihood are safe. Hogan Consulting Group can do the same for you. Contact us to find out how.

Securing your mobile devices and data in an ever-more connected world

As you increase your mobility and cloud footprint, ensuring your people and customers remain secure from any location can be a challenge. Of course, there is no single answer, but there are steps that can be taken. That’s why at Hogan Consulting Group we’re committed to helping you maximize your security by offering resources on getting the most out of your mobile device management (MDM) solutions, biometric security, and modern business devices that have been built expressly for mobile workers. In this paper, we’ll consider why blending on-site security with MDM will give you a more flexible and scalable way to secure your mobile devices, data, and user identities.

Microsoft Practice Development Playbook: Security

As your company embraces the opportunities presented by cloud and mobile computing, you take on new risks. At Hogan Consulting Group we understand that one of the biggest challenges in digital transformation is ensuring security, privacy, and compliance. By developing a security practice, you can help turn the potentially dizzying array of services into a cohesive and understandable security solution that enables you to manage your security and protect your assets. In this playbook, you will find resources to help you protect against, detect, and respond to breaches with a comprehensive security practice.

Week in Breach

Caribou Coffee customers get roasted by data breach

Exploit: Compromise of POS systems.Caribou Coffee: A large coffee chain in the United States. Coffee chain Caribou Coffee recently announced a security breach after discovering unauthorized access of its point of sale (POS) systems.  The company listed 239 stores of its total 603 locations as impacted, which roughly amounts to 40 percent of all its sites. …

Caribou Coffee customers get roasted by data breach Read More »


FBI: Kindly Reboot your router now, please

The Federal Bureau of Investigation (FBI) is warning that a new malware threat has rapidly infected more than a half-million consumer devices. To help arrest the spread of the malware, the FBI and security firms are urging home Internet users to reboot routers and network-attached storage devices made by a range of technology manufacturers. The growing menace …

FBI: Kindly Reboot your router now, please Read More »

social protect

Incredibly Easy Ways To Protect Yourself On Social Media

Social media networks have enabled people across the world to stay connected with their friends and family. However, social media networks rely heavily on personal communications and connections, something that encourages users to provide some amount of personal information. Consequently, scammers and other online criminals are now using social media networks to steal other people’s …

Incredibly Easy Ways To Protect Yourself On Social Media Read More »