How to establish a cybersecurity baseline, and why you should
Cybersecurity requires regular assessments of the environment, identifying the top risks, patching those and then retesting to confirm those issues have been resolved.
Cybersecurity requires regular assessments of the environment, identifying the top risks, patching those and then retesting to confirm those issues have been resolved.
Results-orientated IT Professional with a proven history of 22+ years of hands-on management, budgeting, design, configuration, and implementation of hardware and software necessary to initiate and maintain business connectivity and productivity.
Founder of MA-ITPro, Michael finds the building and enablement of people and technology to be the most fulfilling aspect of his career.
A lifelong woodworker, amateur astronomer, and photographer, Michael blends his passions with spending time with his wife and two children as much as possible.