• HOME
  • SERVICES
    • MANAGED IT SUPPORT
    • CYBERSECURITY
    • STRATEGIC ADVISORY
    • GOVERNANCE, RISK, & COMPLIANCE
    • SAP BASIS & SECURITY
    • SAP IMPLEMENTATION & INTEGRATION
  • BLOG
  • FAQs
  • COMPANY
  • CONTACT
The MFA Level-Up: Why SMS Codes Are No Longer Enough (and What to Use Instead)

The MFA Level-Up: Why SMS Codes Are No Longer Enough (and What to Use Instead)

by Joe Markgraf | Feb 25, 2026 | Cybersecurity

For years, enabling Multi-Factor Authentication (MFA) has been a cornerstone of account and device security. While MFA remains essential, the threat landscape has evolved, making some older methods less effective.The most common form of MFA, four- or six-digit codes...
Threat Detection in Healthcare: How to Stay HIPAA-Compliant and Secure

Threat Detection in Healthcare: How to Stay HIPAA-Compliant and Secure

by Joe Markgraf | Feb 17, 2026 | Cybersecurity

HIPAA-Compliant Threat Detection to Help Stop Cyberattacks Healthcare organizations hold some of the most sensitive data imaginable — patient health records, financial information, and confidential communications. This makes healthcare providers prime targets for...
Securing the ‘Third Place’ Office: Policy Guidelines for Employees Working from Coffee Shops and Coworking Spaces

Securing the ‘Third Place’ Office: Policy Guidelines for Employees Working from Coffee Shops and Coworking Spaces

by Joe Markgraf | Feb 10, 2026 | Cybersecurity

The modern office extends far beyond traditional cubicles or open-plan spaces. Since the concept of remote work became popularized in the COVID and post-COVID era, employees now find themselves working from their homes, libraries, bustling coffee shops, and even...
How to Implement Zero Trust for Your Office Guest Wi-Fi Network

How to Implement Zero Trust for Your Office Guest Wi-Fi Network

by Joe Markgraf | Jan 20, 2026 | Cybersecurity

Guest Wi-Fi is a convenience your visitors expect and a hallmark of good customer service. But it’s also one of the riskiest points in your network. A shared password that’s been passed around for years offers virtually no protection, and a single compromised guest...
The Hidden Risk of Integrations: A Checklist for Vetting Third-Party Apps (API Security)

The Hidden Risk of Integrations: A Checklist for Vetting Third-Party Apps (API Security)

by Joe Markgraf | Dec 20, 2025 | Cybersecurity

Modern businesses depend on third-party apps for everything from customer service and analytics to cloud storage and security. But this convenience comes with risk, every integration introduces a potential vulnerability. In fact, 35.5% of all recorded breaches in 2024...
How to Use a Password Manager and Virtual Cards for Zero-Risk Holiday Shopping

How to Use a Password Manager and Virtual Cards for Zero-Risk Holiday Shopping

by Joe Markgraf | Dec 10, 2025 | Cybersecurity

Have you ever been concerned about your credit card or personal data getting stolen while shopping online? You’re not alone. Each holiday season, as millions of shoppers flock online for convenience, hackers ramp up their activity. The Federal Trade Commission (FTC)...
« Older Entries

Recent Posts

  • Top 5 Reasons Businesses Switch MSPs: The Real Reason Behind IT Support Failures
  • Managing “Cloud Waste” as You Scale
  • Beyond Chatbots: Preparing Your Small Business for “Agentic AI” in 2026
  • The Server Refresh Deadline: Why Windows Server 2016’s End of Support Should Drive Your Cloud Migration Plan
  • The 2026 Microsoft 365 Changes: What You Need to Know

Recent Comments

No comments to show.


1-866-800-1080



32001 32nd Ave S. Ste. 320 Federal Way, WA 98001



sales@markgrafconsulting.com

Get a Free IT Health Assessment Today

Take advantage of our free IT Health Check to evaluate the strengths and weaknesses of your IT infrastructure. Our expert team will provide insights and recommendations to enhance your security and operational efficiency. Start optimizing your IT environment today!

BOOK A TIME NOW!