An executive using a tablet with a mesh security overlay
SIEM Complexity Simplified: How SIEM Works
May 3, 2023

Every organization needs timely, accurate security events that notify the right people as soon as possible. That’s the purpose of security information and event management, or...

Start Reading
SIEM Anacronym: Security Information and Event Management
Not Just Another Anacronym: What Exactly is SIEM?
April 5, 2023

We get it – the cybersecurity world is inundated with complex anacronyms that are often difficult to decipher. It can feel overwhelming when a new one...

Start Reading
Umbrella Secure Endpoint Blog Post Short 850 × 500 px
Using Cisco Umbrella and Secure Endpoint Together for an Undefeated Threat Defense
February 1, 2023

As they say in sports, “The best offense is a good defense.” That’s how teams win games, become champions, and find themselves at the Big Game....

Start Reading
Online Employee Security Training, Your Way
Online Employee Security Training, Your Way
January 9, 2023

Organization-wide employee training may seem like a daunting task. Tracking results, ensuring every employee participates, properly recording data for future reporting purposes are all factors that...

Start Reading
How to Better Capture Data in the Field with Your ERP
How to Better Capture Data in the Field with Your ERP
November 7, 2022

Data capture and entry while in the field can be a time-consuming process that often requires transposing physical documents into your ERP software. It also requires...

Start Reading
Cybersecurity Awareness Month Logo over transparent website lock pattern
The Anatomy of a Data Breach: What are They and What to do When You Spot One?
October 10, 2022

Arguably no phrase has dominated the tech world the last 24 months more than the term “data breach.” From breaches that have impacted critical infrastructure like...

Start Reading
Proactively Protect Your Business with Multi-Factor Authentication
Proactively Protect Your Business with Multi-Factor Authentication
August 5, 2022

Privacy is paramount for both our personal and business lives. We rely on passwords to maintain that privacy on the devices and accounts we use every...

Start Reading
Augmented Reality
Augmented Reality Contact Lenses – The Game Changer for the Metaverse
July 11, 2022

John Dolmetsch, CIO of Business Information Group, gives us a glimpse into the future of Augmented Reality: Contact Lenses.

Start Reading
You Control Access to Your Office. Why Not Your IT?
You Control Access to Your Office. Why Not Your IT?
June 2, 2022

The last time an employee left your business, did you revoke their access to your IT systems? Are you sure? Do you have a way to...

Start Reading
BIG University no date tagline 01
Business Information Group Brings Back BIG University
April 11, 2022

York, PA, April 8, 2022 – After a two-year hiatus, Business Information Group is excited to announce the return of its cybersecurity and IT conference, BIG...

Start Reading
Business Information Group Launches New Website
Business Information Group Launches New Website
April 7, 2022

York, PA, April 4, 2022 – Business Information Group (BIG) is thrilled to announce the launch of its new website. The new site has been updated...

Start Reading
Cisco Blog Post Graphic 1
Three Questions, One Solution
March 13, 2022

Long before the technology boom, there was a need to build better, quality connections between individuals. From the use of telegrams to audio radio transmissions to...

Start Reading