Jan 16, 2025 | Articles, Resources, Uncategorized
Golden West Technologies has successfully renewed its System and Organization Control 2 (SOC 2) Type 1 certification for managed services. This achievement reflects Golden West Technologies’ ongoing dedication to data security, availability, and confidentiality for...
Jan 16, 2025 | Articles, Resources, Uncategorized
On a Monday morning after a good weekend, you try logging into your computer, only to be prompted for a code. You reluctantly take your phone out, tap on the notification, and enter the passcode shown on your phone into your computer. This may seem like an...
Nov 19, 2024 | Articles, Resources
Scott Meyer, CEO and founder of Chipp.ai, said AI in the workplace is not a lazy shortcut for businesses, but an effective tool for boosting efficiency and gathering valuable data. He delivered this message in his keynote address at Golden West’s TECHLeadership...
Nov 18, 2024 | Articles, Resources
Evil doppelgangers may not exist in the real world, but virtually every web or email address can potentially be a victim of doppelganger domains. One cybersecurity agency reported an average of almost 40 doppelganger domain attacks per month for every business they...
Nov 18, 2024 | Articles, Resources
Disaster struck for Richard Keller at 3 a.m. on an October morning in 2020. Awakened by a phone call, the network systems administrator learned Sinte Gleska University’s virtual infrastructure had been hacked. Since classes depended on the internet for continuing...
Oct 16, 2024 | Articles, Resources
Almost every day, companies are hacked and lose valuable assets. They may even be held hostage for their own data. To keep your business safe and running smoothly, penetration (pen) testing is used to prevent possible cyberattacks. “Penetration testing is critical...