ARG, IncARG, IncARG, IncARG, Inc
  • Home
  • About ARG IT Clarity
    • Leadership
    • Board of Directors
    • Our Experts
    • Testimonials
    • Careers
  • Solution Areas
    • Cloud
    • SD-WAN & Connectivity
    • Unified Communications
    • Managed Security
    • Expense Management
    • Customer Experience
    • Colocation
    • Advanced IoT
    • Managed IT
  • Events
    • Events Gallery
  • Kindness
  • News
  • Resources
  • Contact Us

Blog

Home Search results for "Security"

Video Release: 2 Steps to Cybersecurity

By Lindsey Bronston | Security, Video | Comments are Closed | 31 January, 2018 | 0

Thank you to Masergy, ITPG and our amazing sold-out crowd for making 2 Steps to Cybersecurity a great success! After receiving several requests for a recording of the event, the video is now available. Below the video you can find an outline of what was covered by speakers:  Stephen Murphy, VP of ARG, Sharon Smith, VP Cybersecurity Strategy and AdvisoryRead more

7 Technologies Your Business Needs to Thrive in 2018

7 Technologies Your Business Needs to Thrive in 2018

By Erica Lord | Business Continuity, Cloud, DaaS, DRaaS, Mobility, Network, Uncategorized | Comments are Closed | 18 December, 2017 | 3

Below are the top 7 initiatives among ARG’s forward looking clients.  Are these in your 2018 plan?  ARG may be able to help you accomplish all of these things without increasing your current total IT spend. 1.  Test your backup.  Getting all your data backed up is definitely key.  But, with all the attacks that are happening,Read more

A person standing by two directional arrows on the ground; one pointing to "Risk" on the left and the other to "Security" on the right.

Module 2: Security Strategy Development – Identify Where You Need To Go

By Stephen Murphy | Security, Trending Topics | Comments are Closed | 13 December, 2017 | 0

We are on the third installment of our cybersecurity for mid-sized companies program! If you missed our introduction, consider reading the Cybersecurity Strategy & Budgeting Guide overview before proceeding further. Now that you have conducted your active threat assessment, vulnerability assessment, penetration testing and compliance audits, as applicable, you are feeling one of two emotions: significantRead more

Cyber Security

Cybersecurity Module 1: Evaluating the Current State – Know Where You Stand

By Stephen Murphy | Security, Trending Topics | Comments are Closed | 14 November, 2017 | 0

We are embarking on our cybersecurity for mid-sized companies program! If you missed our introduction, consider reading the Cybersecurity Strategy & Budgeting Guide overview before proceeding further. ARG’s program is designed to assist you in understanding the types of security threats you need to manage. We will also discuss how to go about identifying aRead more

Cybersecurity Strategy and Budgeting

Cybersecurity Strategy & Budgeting Guide

By Stephen Murphy | Security, Trending Topics | Comments are Closed | 1 November, 2017 | 0

87% of C-suite executives and Board Members do not have confidence in their company’s level of cybersecurity. (Ernst & Young)

How can your executives be among the 13% that do trust in their cyber security program? The answer may be easier than you think.  

SIEM

What is SIEM and is it Worth It?

By Erica Lord | Security, Trending Topics | Comments are Closed | 24 January, 2017 | 0

SIEM offers significant value for security by aggregating data into meaningful bundles and proactively alerting on malicious activity.

Close-up of a network server rack with blue and red Ethernet cables connected to various ports.

DDoS attack on Dyn highlights growing threat

By Erica Lord | News | Comments are Closed | 15 November, 2016 | 0

Distributed Denial of Service (DDoS) attacks are, for all intents and purposes, a cybersecurity attack that doesn’t so much find back doors, but instead slips in through the cracks.

A word cloud with "cybercrime" in red at the center, surrounded by words related to cybersecurity such as "internet," "virus," "hacking," "firewall," and "spyware" in various sizes and colors.

Welcome to the White House, sorry about all the cybercrime

By Erica Lord | News | Comments are Closed | 4 November, 2016 | 0

Forrester has some dire predictions for our next president.  With the Department Of Homeland Security and Office of the Director of National Intelligence on Election Security blaming Russian hackers for recent breaches, it may not be too far-fetched.

A person points to a padlock icon on a touch screen displaying various cybersecurity-related terms in hexagonal shapes, including "Protection," "Information systems," and "Internet.

Cybersecurity assessment basics – What are they and why do costs vary so much?

By Erica Lord | Cloud Implementation, Security, Trending Topics | Comments are Closed | 31 October, 2016 | 2

A good cybersecurity assessment will identify areas where your systems are vulnerable and make recommendations for how you can improve security.

A mobile phone is wrapped in chains and secured with a padlock, symbolizing restricted access or security.

ARG early release of Cybersecurity Portfolio

By Erica Lord | News | Comments are Closed | 23 October, 2016 | 0

ARG’s technology consulting now incorporates security.  ARG has vetted providers and can help you make the right choice for your cybersecurity needs.

Person typing on a laptop while holding a smartphone, with a tablet resting on the table nearby.

5 Mobile Device Management Best Practices

By Erica Lord | Mobile Device Management, Mobility | Comments are Closed | 20 September, 2016 | 0

Using mobile devices outside of the office may be convenient for employees, but it must be managed effectively.

Person in a suit holding a hand out, with floating cloud icons superimposed over the image, representing cloud computing or technology.

How IT can increase productivity

By Stephen Murphy | Trending Topics | Comments are Closed | 25 April, 2016 | 0

An increasing “must have” in commercial IT services today is desktop as a service (DaaS). Not only does DaaS improve employee productivity and ease of getting work done from anywhere on any device, but DaaS is increasingly recognized as a key component to the security strategy of an organization. Learn how this technology increases efficiency and eases  IT management burdens.

Illustration of a digital cloud with binary code and circuitry in the background, representing cloud computing and data networking.

Cloud – The Shift is Happening

By Stephen Murphy | Cloud, Cloud Computing, News, Trending Topics | Comments are Closed | 7 April, 2016 | 0

Beginning in 2014, ARG saw interest in cloud services start to grow substantially. Our clients were getting comfortable with the solutions and 3 key elements were being addressed to their satisfaction:

·         Security. The concern that the cloud is less secure than their own datacenter. Gartner and other independent analyst firms have studied the risks, concluding that cloud is generally more secure than premises-based implementations.

·         Savings. 

Recent Posts

  • What Your Cloud Provider Doesn’t Want You to Know About Expense Management
  • Top 10 Considerations for Choosing the Right Unified Communication and Contact Center Provider
  • ARG Recognized as a Best Place to Work in Virginia for the 11th Time
  • Mobile Medical Provider Ensures Seamless, Secure Imaging Services
  • Locking the Digital Door: Top Cybersecurity Priorities for 2025

Categories

  • Artificial Intelligence
  • Business Continuity
  • Case Study
  • CCaaS
  • Cloud
  • Cloud Communications
  • Cloud Computing
  • Cloud Implementation
  • Collaboration
  • Communication
  • Company Culture
  • Compliance
  • Connectivity
  • Contact Center
  • Contingency Planning
  • Cost Optimization
  • Customer Experience
  • DaaS
  • Defense Contractor
  • Digital Transformation
  • DRaaS
  • Events
  • Expense Management
  • Financial Services
  • Government Contractor
  • IaaS
  • Infrastructure
  • Internet of Things
  • IoT
  • IT Clarity
  • IT Expense Management
  • Kindness
  • Legal
  • M&A
  • Managed IT
  • Managed Security
  • Managed Service Provider
  • Medical
  • Microsoft Teams
  • Mobile Device Management
  • Mobility
  • MSP
  • MSSP
  • Network
  • News
  • Nonprofit
  • Northeast
  • Personnel
  • Podcast
  • POTS Replacement
  • Press Release
  • Remote Work
  • SD-WAN
  • Security
  • Solution Highlight
  • Southeast
  • Success Story
  • Sustainability
  • Technology Expense Management
  • Telecom
  • Telecom Expense Management
  • TEM
  • Trending Topics
  • UCaaS
  • Uncategorized
  • Unified Communications as a Service
  • Video
  • Webinar
  • Why ARG
  • Wireless

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
    • Savannah Bananas vs. Party Animals
    • Savannah Bananas vs. Party Animals
    • 06/06/25
    • Charlotte, NC
    • Fall Fest 2025: Family Fun Day
    • Fall Fest 2025: Family Fun Day
    • 10/05/25
    • Aldie, VA
  • View All Events
  • Washington DC Headquarters: (703) 770-2400
    Maryland Office: (240) 235-0080
    Northeast Office: (401) 825-4170
    Careers
    Contact Us
    Privacy Policy
    Copyright 2024 ARG, Inc.
    • Home
    • About ARG IT Clarity
      • Leadership
      • Board of Directors
      • Our Experts
      • Testimonials
      • Careers
    • Solution Areas
      • Cloud
      • SD-WAN & Connectivity
      • Unified Communications
      • Managed Security
      • Expense Management
      • Customer Experience
      • Colocation
      • Advanced IoT
      • Managed IT
    • Events
      • Events Gallery
    • Kindness
    • News
    • Resources
    • Contact Us
    ARG, Inc