701 W. National Rd. Englewood, OH. 45322


Turning Cybersecurity into a Competitive Advantage

One perspective of IT and Cybersecurity policies is that they inhibit or reduce the efficiency of your business. A type of tax to be paid as a price of doing business. We get it but let us give you another perspective that turns your IT practices and policies for turning cybersecurity into a competitive advantage…   …
Read more

Top 6 Security Practices For Your Business

Keeping your company cyber-safe When it comes to cybersecurity for your business, some practices need to be automatic, like brushing your teeth. Once set up and implemented, the effort is minimal, but the payoff is enormous for your company’s security posture.  So let’s dig in – The top 6 security practices that should be happening in…
Read more

In-house IT teams have a tough job

Let us help make it easier. When it comes to cybersecurity, In-house IT teams have a tough job – probably the toughest job out there. That’s because you have to take care of everything IT-related – in addition to managing security. All too often there is no one on your team dedicated to security –…
Read more

Malicious Activity Evaluation

Partnering with the best for a malicious activity evaluation Today, a company’s brand value is staked largely on how well it protects its data, reputation, and trust,and on the strength of its cybersecurity technology, teams, and processes. Customers, investors, and board members often factor security posture into company valuations and how they approach deals, partnerships,…
Read more

Optimizing Cyber Insurance

Optimizing cyber insurance – The cyber insurance market is getting tougher and for many organizations, it’s getting harder

2021 Dayton Dragons Ticket Giveaway

Like and follow our Facebook post and page to win a set of four Dayton Dragons tickets, https://www.facebook.com/d9technology/ Rules & Regulations NO PURCHASE IS NECESSARY TO ENTER OR WIN. MAKING A PURCHASE OR PAYMENT OF ANY KIND WILL NOT INCREASE YOUR CHANCES OF WINNING. VOID WHERE PROHIBITED OR RESTRICTED BY LAW. PROMOTION DESCRIPTION: The Four…
Read more

Top 10 Security Misperceptions

Our partners at Sophos have compiled a list of the Top 10 Security Misconceptions seen in the last year in cyberattacks

Companies skimp on cybersecurity defense at their own peril

Check out what our own Eric Brown, one of our managing partners had to say recently on the topic of data breaches and ransomware…

What is a Managed Service Provider (MSP)?

What is a Managed Service Provider (MSP)? A managed service provider delivers services, such as network, application, infrastructure

Authentication Best Practices

A Modern Phishing Attack – Part 3 Authentication Best Practices to Prevent Sophisticated Phishing Attacks This is part three of a three-part series on the anatomy of a phishing attack. Our partners at Cisco have outlined how-to prevent a phishing attack below. As the case study from Part 2 reveals, compromised credentials and access to the…
Read more