top of page
Search
![](https://static.wixstatic.com/media/6ad151_60ff7f42f7e644fdb23d0943ef844e09~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_60ff7f42f7e644fdb23d0943ef844e09~mv2.webp)
![Security Lessons for Small Businesses from the SolarWinds Orion Breach](https://static.wixstatic.com/media/6ad151_60ff7f42f7e644fdb23d0943ef844e09~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_60ff7f42f7e644fdb23d0943ef844e09~mv2.webp)
Jan 19, 20214 min read
Security Lessons for Small Businesses from the SolarWinds Orion Breach
You've most likely heard the recent news of the large Solarwinds breach that was discovered in December of 2020. While there is a lot of...
![](https://static.wixstatic.com/media/6ad151_74452d44c4ca4cec98d0e80be806c326~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_74452d44c4ca4cec98d0e80be806c326~mv2.webp)
![Challenges in Securing the Human Operating System](https://static.wixstatic.com/media/6ad151_74452d44c4ca4cec98d0e80be806c326~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_74452d44c4ca4cec98d0e80be806c326~mv2.webp)
Oct 15, 20203 min read
Challenges in Securing the Human Operating System
No matter how much focus and attention your organization puts into security solutions including anti virus, firewalls, and email filters,...
![](https://static.wixstatic.com/media/6ad151_956b48b45bbe47e3ab458a649ff03359~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_956b48b45bbe47e3ab458a649ff03359~mv2.webp)
![Setting Security Policies & Procedures to Proactively Protect Your Organization - Securing Our House](https://static.wixstatic.com/media/6ad151_956b48b45bbe47e3ab458a649ff03359~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_956b48b45bbe47e3ab458a649ff03359~mv2.webp)
Jul 30, 20202 min read
Setting Security Policies & Procedures to Proactively Protect Your Organization - Securing Our House
All year we have been discussing how we're prioritizing security at Mapletronics in our ongoing "Securing Our House" series. While most...
![](https://static.wixstatic.com/media/6ad151_7e3b89d68c9b468094dc536558f95732~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_7e3b89d68c9b468094dc536558f95732~mv2.webp)
![New Security Challenges Arise as the Majority of Newly Remote Workers Use Personal Devices](https://static.wixstatic.com/media/6ad151_7e3b89d68c9b468094dc536558f95732~mv2.jpg/v1/fill/w_454,h_326,fp_0.50_0.50,q_90,enc_auto/6ad151_7e3b89d68c9b468094dc536558f95732~mv2.webp)
Jul 16, 20202 min read
New Security Challenges Arise as the Majority of Newly Remote Workers Use Personal Devices
This spring when Covid-19 took the world by storm, many companies had to switch to a work-from-home strategy to keep their teammates and...
![](https://static.wixstatic.com/media/6ad151_5b8a037bbb79476ebbd819f511be18eb~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_5b8a037bbb79476ebbd819f511be18eb~mv2.webp)
![Protecting Your Remote Workforce From Phishing Schemes](https://static.wixstatic.com/media/6ad151_5b8a037bbb79476ebbd819f511be18eb~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_5b8a037bbb79476ebbd819f511be18eb~mv2.webp)
Jul 9, 20204 min read
Protecting Your Remote Workforce From Phishing Schemes
While the Covid-19 Pandemic has changed the way many workforces are conducting business, it hasn't slowed down cybercriminals in their...
![](https://static.wixstatic.com/media/6ad151_e2b0523806e24dab9a1fb2ba096ac70b~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_e2b0523806e24dab9a1fb2ba096ac70b~mv2.webp)
![9 Ways to Harden Microsoft 365 Environments](https://static.wixstatic.com/media/6ad151_e2b0523806e24dab9a1fb2ba096ac70b~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_e2b0523806e24dab9a1fb2ba096ac70b~mv2.webp)
Jun 22, 20202 min read
9 Ways to Harden Microsoft 365 Environments
If you use Microsoft 365 within your organization you should consider taking some time to look into your security settings and have your...
![](https://static.wixstatic.com/media/6ad151_5d8c8a4323934ea0ab54a7ea270483d4~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_5d8c8a4323934ea0ab54a7ea270483d4~mv2.webp)
![A Beginners Guide to the NIST Cybersecurity Framework](https://static.wixstatic.com/media/6ad151_5d8c8a4323934ea0ab54a7ea270483d4~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_5d8c8a4323934ea0ab54a7ea270483d4~mv2.webp)
Jun 17, 20204 min read
A Beginners Guide to the NIST Cybersecurity Framework
The NIST cybersecurity framework has many complexities, to help break it down we have put together this quick overview.
![](https://static.wixstatic.com/media/6ad151_0ab87acdac9d4162a5e2bec89a736dd3~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_0ab87acdac9d4162a5e2bec89a736dd3~mv2.webp)
![14 Ways to Protect Your Business from a Cyber Attack](https://static.wixstatic.com/media/6ad151_0ab87acdac9d4162a5e2bec89a736dd3~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_0ab87acdac9d4162a5e2bec89a736dd3~mv2.webp)
Jun 11, 20202 min read
14 Ways to Protect Your Business from a Cyber Attack
In the fast paced digital world of today hacks and data breaches are of major concern for businesses of all sizes. To help you begin to...
![](https://static.wixstatic.com/media/6ad151_8f1ea137501746cf918ea24ac686da6e~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_8f1ea137501746cf918ea24ac686da6e~mv2.webp)
![Choosing the Right Cybersecurity Framework](https://static.wixstatic.com/media/6ad151_8f1ea137501746cf918ea24ac686da6e~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_8f1ea137501746cf918ea24ac686da6e~mv2.webp)
Jun 2, 20202 min read
Choosing the Right Cybersecurity Framework
Cybersecurity Frameworks provide the structure and methodology you need to protect your important digital assets. While there are many...
![](https://static.wixstatic.com/media/6ad151_190bb80b0e6e489b812eee2158da6294~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_190bb80b0e6e489b812eee2158da6294~mv2.webp)
![11 Key Aspects to Implement When Creating a Cybersecurity Plan for Your Organization](https://static.wixstatic.com/media/6ad151_190bb80b0e6e489b812eee2158da6294~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_190bb80b0e6e489b812eee2158da6294~mv2.webp)
Jun 1, 20203 min read
11 Key Aspects to Implement When Creating a Cybersecurity Plan for Your Organization
1. Develop Security Roles for your organization – Decide who in your organization is responsible for developing, implementing, and...
![](https://static.wixstatic.com/media/6ad151_d1086d3d5c71462286ebed0f60e1d565~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_d1086d3d5c71462286ebed0f60e1d565~mv2.webp)
![Prioritizing Detection in Cybersecurity Planning - Securing Our House](https://static.wixstatic.com/media/6ad151_d1086d3d5c71462286ebed0f60e1d565~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_d1086d3d5c71462286ebed0f60e1d565~mv2.webp)
May 28, 20203 min read
Prioritizing Detection in Cybersecurity Planning - Securing Our House
At Mapletronics we have made "Securing Our House" as a number 1 priority in 2020. While cybersecurity has been on the forefront of our...
![](https://static.wixstatic.com/media/6ad151_5f85400a16d44c799d50a756118929de~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_5f85400a16d44c799d50a756118929de~mv2.webp)
![The Benefits of Microsoft 365](https://static.wixstatic.com/media/6ad151_5f85400a16d44c799d50a756118929de~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_5f85400a16d44c799d50a756118929de~mv2.webp)
May 27, 20203 min read
The Benefits of Microsoft 365
Moving to the cloud can be a big decision for any business. The benefits of Microsoft 365 make the decision a little bit easier. We've...
![](https://static.wixstatic.com/media/6ad151_77074f44e76243a4b32fe5f7de0e5d7c~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_77074f44e76243a4b32fe5f7de0e5d7c~mv2.webp)
![Covid-19 Causes a Rise in Phishing Attempts – Educate Your Team to Protect Your Organization](https://static.wixstatic.com/media/6ad151_77074f44e76243a4b32fe5f7de0e5d7c~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_77074f44e76243a4b32fe5f7de0e5d7c~mv2.webp)
May 18, 20204 min read
Covid-19 Causes a Rise in Phishing Attempts – Educate Your Team to Protect Your Organization
The world is continuing to focus on the health and economic conditions surrounding the Covid-19 pandemic and cybercriminals are using the...
![](https://static.wixstatic.com/media/6ad151_9350899cdfcf45458596b14b48ea4fb2~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_9350899cdfcf45458596b14b48ea4fb2~mv2.webp)
![Creating a Cybersecurity Plan for Your Organization](https://static.wixstatic.com/media/6ad151_9350899cdfcf45458596b14b48ea4fb2~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_9350899cdfcf45458596b14b48ea4fb2~mv2.webp)
May 12, 20203 min read
Creating a Cybersecurity Plan for Your Organization
Cybersecurity risks continue to grow and evolve in a fast paced way. Cybersecurity is no longer reserved for major corporations, in fact,...
![](https://static.wixstatic.com/media/6ad151_6b66def208f04e50a8f3718112a3b49a~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_6b66def208f04e50a8f3718112a3b49a~mv2.webp)
![World Password Day: Don't Let Weak Passwords Make You an Easy Target](https://static.wixstatic.com/media/6ad151_6b66def208f04e50a8f3718112a3b49a~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_6b66def208f04e50a8f3718112a3b49a~mv2.webp)
May 7, 20202 min read
World Password Day: Don't Let Weak Passwords Make You an Easy Target
Today is world password day. There is perhaps no better day than today to review your password hygiene and be sure you are protecting...
![](https://static.wixstatic.com/media/6ad151_1ba5083390d641c0a3451c961bf1be94~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_1ba5083390d641c0a3451c961bf1be94~mv2.webp)
![Is Remote Work Here to Stay?](https://static.wixstatic.com/media/6ad151_1ba5083390d641c0a3451c961bf1be94~mv2.jpg/v1/fill/w_454,h_300,fp_0.50_0.50,q_90,enc_auto/6ad151_1ba5083390d641c0a3451c961bf1be94~mv2.webp)
May 6, 20204 min read
Is Remote Work Here to Stay?
As we continue to deal with the realities of the Covid-19 pandemic, many organization are looking into the future and beginning to make...
![](https://static.wixstatic.com/media/6ad151_efefe6a78baa4cedabeb90425d2db477~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_efefe6a78baa4cedabeb90425d2db477~mv2.webp)
![The Principle of Least Privilege - Securing Our House](https://static.wixstatic.com/media/6ad151_efefe6a78baa4cedabeb90425d2db477~mv2.jpg/v1/fill/w_454,h_300,fp_0.50_0.50,q_90,enc_auto/6ad151_efefe6a78baa4cedabeb90425d2db477~mv2.webp)
May 5, 20202 min read
The Principle of Least Privilege - Securing Our House
We are continuing our discussion on "Securing Our House" where we share the steps we are taking internally at Mapletronics to ensure that...
![](https://static.wixstatic.com/media/6ad151_a03e8cab0e584fcea97f62d6aa6c2c93~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_a03e8cab0e584fcea97f62d6aa6c2c93~mv2.webp)
![Is Detection the Future of Cybersecurity Planning](https://static.wixstatic.com/media/6ad151_a03e8cab0e584fcea97f62d6aa6c2c93~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_a03e8cab0e584fcea97f62d6aa6c2c93~mv2.webp)
Apr 26, 20203 min read
Is Detection the Future of Cybersecurity Planning
Cybersecurity is top of mind for many organizations of all sizes and industries. Given the current risk climate, organizations are...
![](https://static.wixstatic.com/media/6ad151_2c3a058e8778429aa12927bdeb6bf2f8~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_2c3a058e8778429aa12927bdeb6bf2f8~mv2.webp)
![Securing Our House - Office 365 Security Standards](https://static.wixstatic.com/media/6ad151_2c3a058e8778429aa12927bdeb6bf2f8~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_2c3a058e8778429aa12927bdeb6bf2f8~mv2.webp)
Apr 23, 20203 min read
Securing Our House - Office 365 Security Standards
We are continuing to work on our internal goal here at Mapletronics to "Secure Our House". We have prioritized closely looking at and...
![](https://static.wixstatic.com/media/6ad151_a54454ceb2914c70b9e2ef5bdb2c0a8a~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_a54454ceb2914c70b9e2ef5bdb2c0a8a~mv2.webp)
![Is a Distributed Workforce Here to Stay?](https://static.wixstatic.com/media/6ad151_a54454ceb2914c70b9e2ef5bdb2c0a8a~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_a54454ceb2914c70b9e2ef5bdb2c0a8a~mv2.webp)
Apr 15, 20203 min read
Is a Distributed Workforce Here to Stay?
Covid-19 has caused swift changes in the way organizations get work done. It leads us to question what adaptations will be here to stay....
bottom of page