All articles from Technologent

How to Identify and Mitigate Data Manipulation Attacks

Data Privacy Remains an Elusive Goal for Most Organizations

Transform Cumbersome Business Processes with Hyperautomation

Effective Cloud Management Requires a Data Center Mindset

Frameworks Provide a Structured Approach for Reducing Risk

Immutable Backup Protects Against New Ransomware Attacks

Technologent Celebrates its 20th Year in Business in 2022

Despite Challenges, AIOps Delivers Important Benefits

2022 Cybersecurity Outlook, Part 2: Be Prepared

2022 Cybersecurity Outlook: Log4j Flaw Will Have Major Impact

Technologent's David Martinez Interviewed for Patient Safety & Quality Healthcare Magazine

The Many Benefits of Third-Party IT Support Services

More Technology Lessons Learned in 2021

Technology Lessons Learned in 2021

Accelerate IT Automation with Managed Services

Boost Productivity and Cut Costs with Robotic Process Automation

Technologent's Jon Mendoza Interviewed for Authority Magazine

Technologent Featured as a "Companies That Care 2021" Honoree

Technologent Named a Winner of the Orange County Top Workplaces 2021 Award

Technologent's Nathan Hull Featured Cyber Defense Magazine

Effective Security Requires Increased Focus on Threat Detection

On Guard: Rising Threats Require Constant Vigilance

Security Awareness Training Is Critical to Effective Protection Against Threats

Cultural Transformation in Technology Stands to Boost Company Efficiency (featured on Yahoo.com)

What’s Your Threat Remediation Plan?

Regular Assessments a Prescription for Healthy Cybersecurity

Cybersecurity Prevention Should Be at the Top of Every Organization’s Priority List

App Modernization Alleviates the Risk of Legacy Software and Limited Expertise

Technologent's Kevin Buckley Interviewed on Disruption Interruption Podcast

5 Strategies for Modernizing Mobile Device Management