NIST Cybersecurity Framework

The What and Why’s of NIST Cybersecurity Framework

The NIST Cybersecurity Framework (CSF) is designed with the intent that individual businesses and other organizations use an assessment of the business risks they face to guide their use of the framework in a cost-effective way.

The Framework is typically customized based on organizations’ unique risk posture (e.g., variance in threats, vulnerabilities, and risk tolerances, and how they implement the practices in the Framework). Organizations can determine activities that are important to critical service delivery and can prioritize investments to maximize the impact of each dollar spent. Ultimately, the Framework is aimed at reducing and better managing cybersecurity risk

Read more

Cyber-Mythbusters: Pendello’s own Cyber-reality series

The what, why, and how of cybercrime

Around the globe, cybersecurity is a constant headline in the news. What is this new digital norm everyone's talking about, and what can we do to stay safe and secure in this ever-changing connected world?

We'll explore 3 common cybersecurity myths, and we'll arm you with the education to help your business understand this ever-growing threat and feel the strength in your expert team to fight back with a strong cybersecurity defense.

Read more

How to Get a Personal Office Assistant who doesn’t require Coffee Breaks

Microsoft’s “Calendar.Help” With Cortana

If you are like me, my to-do lists get longer by the minute and there doesn’t seem to be enough time in a day to ever complete it. One of the biggest time sucks can be coordinating meetings. This can be especially true when you’re scheduling with attendees outside of your own company. It would be nice if we all had personal assistants who could schedule the meetings for us but, the reality of that is slim. What if you could have a digital assistant that understood real language and could take over the lengthy process of navigating the schedules of the attendees? What if this assistant could handle the back and forth emailing and could propose new times that would avoid conflicts and once decided upon, could send the invite to all attendees? Amazingly, this futuristic technology already exists through Microsoft’s Cortana with and has been around for close to a year!

How does this service that combines artificial intelligence, conversational computing and calendar work and how do you get it working for you?

Read more

Get out of Dark Ages, it is Time to Upgrade

Microsoft 2007 has Officially Retired

On October 10th, 2017 Mircrosoft 2007 officially retired. (Click here to watch the retirement party) The software did not move to Florida but instead has been placed on a high shelf of Microsoft’s hypothetical storage pod. What does this mean for anyone still running on this 10-year old software? (Other than you are running on 10-year old software!!) Basically, you are time bomb waiting to go off as this product has reached the end of its support lifecycle.

Read more

What is Mike digesting in November?

The Antithesis to, “What’s Eating Gilbert Grape.”

November’s look at what Pendello President, Mike Jackson, is currently reading or listening to:


This award-winning weekly podcast is hosted by Stephen J. Dubner, the co-author of Freakonomics, and delves into a menagerie of incredibly interesting topics.

Read more

Security Exchange Commission Security Breach

How do we stay safe when the regulators are getting Hacked?

One of the major roadblocks in today’s business world is security. We are constantly trying to stay ahead of the “bad guys” by staying up on the newest technologies to keeps us safe. We even have regulations which, in theory, should keep us safe. But, what happens when those in charge of the regulations themselves get hacked? And, what happens when regulators aren’t following their own protocols?

Read more

Smartphones: Your personal assistant or a covert spy?

Is your smartphone listening to your conversations?

Our smartphones have inherently become an attached part of our beings. For good or bad, they go absolutely everywhere with us. Most cannot imagine being apart from them. (A topic recently discussed in The Wall Street Journal) They are never far away. In fact, we even sleep next to them! But, did you know, these personal little devices that we cannot stand to live without are technically tiny little data recorders recording a great deal of information when most of us have no idea.

Read more

Recent Posts

20 Critical Questions You Must Ask Before Hiring any IT Company