New SEC Cybersecurity Requirements
Cybersecurity has become paramount for businesses across the globe. As technology advances, so do the threats. Recognizing this, the U.S. Securities...
Wingman Parachute: An Internet Lifeline
In the fast-paced world of business, a reliable internet connection is essential... but what happens when the internet goes down? The consequences...
Everyday Objects Can Lead to Identity Theft
You wouldn’t think a child’s toy could lead to a breach of your personal data. But this happens all the time. What about your trash can sitting...
January 2024 Wingman IT Employee Spotlight: Alex “Kilo” Criswell
Meet Alex “Kilo” Criswell. Alex is one of our helpdesk technicians whose primary job is answering the call for help whether it comes by phone,...
Beware of These 2024 Emerging Technology Threats
The global cost of a data breach last year was USD $4.45 million. This is an increase of 15% over three years. As we step into 2024, it’s crucial to...
Safely Share Passwords with a Password Manager
Breached or stolen passwords are the bane of any organization’s cybersecurity. Passwords cause over 80% of data breaches. Hackers get in using...
What is Zero-Click Malware?
In today’s digital landscape, cybersecurity threats continue to evolve. They pose significant risks to individuals and organizations alike. One such...
December 2023 Wingman IT Employee Spotlight: Steve “Wizard” Melcher
Meet Steve "Wizard" Melcher. With decades of experience, we are proud to have Steve as an integral part of our IT Team, helping our business...
6 Ways to Prevent One of The Most Common Sources of Data Breaches
Misconfiguration of Cloud Solutions is often overlooked when companies plan Cybersecurity Strategies. Cloud apps are typically quick and easy to...
Do You Still Believe in These Common Tech Myths?
Is it okay to leave your smartphone charging overnight? Do Macs get viruses? And what about those 5G towers? What’s going on with those? Common tech...










