• HOME
  • SERVICES
    • MANAGED IT SUPPORT
    • CYBERSECURITY
    • STRATEGIC ADVISORY
    • GOVERNANCE, RISK, & COMPLIANCE
    • SAP BASIS & SECURITY
    • SAP IMPLEMENTATION & INTEGRATION
  • BLOG
  • FAQs
  • COMPANY
  • CONTACT
The 2026 Microsoft 365 Changes: What You Need to Know

The 2026 Microsoft 365 Changes: What You Need to Know

by Joe Markgraf | Feb 25, 2026 | Microsoft

Microsoft® 365 announced big changes for 2026—the most significant updates in years! This time, the shifts are deeper, faster, and more interconnected than most organizations are prepared for. Whether you’re running a small team or overseeing complex IT operations,...
The MFA Level-Up: Why SMS Codes Are No Longer Enough (and What to Use Instead)

The MFA Level-Up: Why SMS Codes Are No Longer Enough (and What to Use Instead)

by Joe Markgraf | Feb 25, 2026 | Cybersecurity

For years, enabling Multi-Factor Authentication (MFA) has been a cornerstone of account and device security. While MFA remains essential, the threat landscape has evolved, making some older methods less effective.The most common form of MFA, four- or six-digit codes...
The Daily Cloud Checkup: A Simple 15-Minute Routine to Prevent Misconfiguration and Data Leaks

The Daily Cloud Checkup: A Simple 15-Minute Routine to Prevent Misconfiguration and Data Leaks

by Joe Markgraf | Feb 20, 2026 | Cloud

Moving to the cloud offers incredible flexibility and speed, but it also introduces new responsibilities for your team. Cloud security is not a “set it and forget it” type task, small mistakes can quickly become serious vulnerabilities if ignored.You don’t need to...
Threat Detection in Healthcare: How to Stay HIPAA-Compliant and Secure

Threat Detection in Healthcare: How to Stay HIPAA-Compliant and Secure

by Joe Markgraf | Feb 17, 2026 | Cybersecurity

HIPAA-Compliant Threat Detection to Help Stop Cyberattacks Healthcare organizations hold some of the most sensitive data imaginable — patient health records, financial information, and confidential communications. This makes healthcare providers prime targets for...
The “Deepfake CEO” Scam: Why Voice Cloning Is the New Business Email Compromise (BEC)

The “Deepfake CEO” Scam: Why Voice Cloning Is the New Business Email Compromise (BEC)

by Joe Markgraf | Feb 15, 2026 | AI

The phone rings, and it’s your boss. The voice is unmistakable; with the same flow and tone you’ve come to expect. They’re asking for a favor: an urgent wire transfer to lock in a new vendor contract, or sensitive client information that’s strictly confidential....
« Older Entries
Next Entries »

Recent Posts

  • Stop Ransomware in Its Tracks: A 5-Step Proactive Defense Plan
  • How to Run a “Shadow AI” Audit Without Slowing Down Your Team
  • A Small Business Roadmap for Implementing Zero-Trust Architecture
  • SAP GRC Action Usage Report: How to Analyze T‑Code Activity and Optimize Access
  • 5 Security Layers Your MSP Is Likely Missing (and How to Add Them)

Recent Comments

No comments to show.


1-866-800-1080



32001 32nd Ave S. Ste. 320 Federal Way, WA 98001



sales@markgrafconsulting.com

Get a Free IT Health Assessment Today

Take advantage of our free IT Health Check to evaluate the strengths and weaknesses of your IT infrastructure. Our expert team will provide insights and recommendations to enhance your security and operational efficiency. Start optimizing your IT environment today!

BOOK A TIME NOW!