Video Series: Creating a Business Continuity & Disaster Recovery Plan

By May 7, 2021May 13th, 2021Consulting, Leadership, Videos
Business Continuity & Disaster Recovery

In May we’re doing a series of tips on creating a business continuity and disaster recovery (BCDR) plan for your organization. Here are our first two videos!

Recent Posts


Among Titans: OXEN Technology Honored at the MSP Titans of the Industry Awards

| Announcements | No Comments
Beverly Hills, CA - The red carpet was rolled out this Wednesday at the Beverly Hilton, and we are proud to report that OXEN Technology was there among the best in the business. On December 10, 2025, OXEN Technology was recognized as a finalist in the MSP Titans of the Industry Awards for the category of Best MSSP (Managed Security Service Provider). What are the "Titans" Awards? Hosted by MSP Success, the Titans of the Industry Awards are not your average participation trophies. They are highly competitive, merit-based honors designed to spotlight Managed Service Providers who are redefining the industry.…

2026 Cybersecurity Outlook: Strategic Insights for Organizational Leaders

| Cybersecurity, Education | No Comments
As we approach 2026, the cybersecurity landscape is evolving at an unprecedented pace. Organizations operating in sectors such as banking and critical infrastructure face mounting challenges as the sophistication and frequency of cyber threats accelerate. Regulatory pressures continue to grow, demanding robust compliance and proactive risk management. This report provides an authoritative overview of key trends, practical frameworks, and strategic solutions—particularly focusing on the CIS framework and Microsoft cloud security tools—to empower organizational leaders in building resilient, compliant operations. Evolving Threat Landscape Cyber threats are becoming more targeted and disruptive, with ransomware, supply chain attacks, and advanced persistent threats (APTs)…

The Case for Email Security: Why Protecting Your Inbox Protects Your Entire Business

| Cybersecurity, Security | No Comments
Cybersecurity attacks aren’t usually loud or dramatic. In fact, most breaches start quietly—with a single compromised email account. Email remains the #1 attack vector for cybercriminals, and today’s threats are more advanced, more targeted, and more costly than ever. That’s why organizations can no longer rely on spam filters and hope for the best. True protection requires comprehensive email security, backed by multi-factor authentication and strong identity protection. This is the case for building all three into your cybersecurity strategy. Email is the New Front Door, and Attackers Know It More than 90% of successful cyberattacks begin with email. Criminals…
Share