• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
RKON transparent logo

RKON

Private Equity Services

  • About RKON
    • Our Team
    • Our Philosophy
    • Our Partners
    • Testimonials
    • Careers
  • Resources
    • Articles
    • Case Studies
    • Podcasts
    • RKON Talks
    • Videos
    • Webinars
    • White Papers
  • Private Equity
        • Project Ransom

          A ransomware attack is isolated at the…

          Project Hammer

          A client struggling under redundant systems is…

          Project Grid

          Neglected IT infrastructure is assessed and rebuilt…

        • IT Advisory
          • Due Diligence
          • Software Engineering
          • 100 Day Plan
          • IT Roadmap
          • IT Security & Compliance
          • IT Diagnostic
          • Portfolio Security Assessment
        • Mergers & Acquisitions
          • Carve-Out
          • Platform Creation
          • Post-Merger Integration
  • Technology Services
        • Strategy
          • IT Roadmap
          • IT Diagnostic
          • Cloud Strategy
        • Migration Services
          • Modern Workplace
          • IT Transformation
          • Cloud Migration
          • Microsoft Azure Migration
        • Managed Services
          • IT Help Desk
          • Compliant Cloud
          • Microsoft Azure Management
        • Security Services
          • vCISO
          • Security Assessment
          • Managed Detection Response
          • Security Breach Recovery
          • Cloud Security
  • Contact Us

Low Cost, High Impact

Man using hands to hold an illustration of lock icon.

In this season one finale, our SecureChat hosts discuss different options that have a low cost but high impact on securing your company.

Reaching New Heights with Cloud Scalability

Blue illustration with cloud.

In this episode, Escalation Manager, Anthony Galvan, joins SecureChat hosts Cory and Sean as they discuss the advantages of cloud scalability, especially during a disaster recovery scenario.

Inside RKON’s MSP Front Line

Man holding tablet and holding finger out to touch a blue light.

This week, RKON’s CEO Jeff Mullarkey joins our SecureChat hosts Cory and Sean as they discuss how security has changed and what RKON’s MSP experts have done to adapt and successfully keep up with the security evolution.

Security From Home

Woman's hand touching an illustration of an mail icon.

In this episode, our SecureChat hosts discuss the uptake in security risks and vulnerabilities during this era of remote work and how your business can quickly and effectively secure your employees & your data. 

Protecting New Deals from Wire Fraud

Blue and red illustration of lock icons.

In this episode, RKON security experts discuss how financial and executive leadership can proactively identify and prevent wire fraud and related email-based scams, which cost industries millions of dollars daily.

CPX 360 (Part 2): Building Proactive Incident Response

Illustration of laptop and clouds with blue background.

In the second episode of our CPX series, security expert Tim Otis from Check Point Software Technologies joins our producer Dannie Asante-Appiah to discuss what it means to build a proactive incident response plan for your business.

CPX 360 (Part 1): New Year, New Security

Illustration of white cloud with blue background.

In the first episode of our special CPX series, we travel to Check Point’s annual Cybersecurity conference (CPX360) in New Orleans to speak with security experts about their take on the role cybersecurity and incident response will play in 2020.

Who, What, and Ware

Hand pointing to touch an illustration of a digital concept.

In this episode our SecureChat hosts take a closer look at the various types of -wares that computers are vulnerable to, as well as vulnerability management solutions that can help prevent future attacks.

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Go to page 5
  • Go to Next Page »

Primary Sidebar

Recent Posts

  • Data Governance is Now a Must-Have Strategy
  • Got an Identity Crisis? How to Tackle Identity Governance Complexity
  • SASE and SSE: The Difference Between Them and Why You Should Care
  • Increase Deal Success by Leaning into Cultural Assimilation
  • The 4 Critical Stages in the Journey to Digital Transformation

Want more insights?

Subscribe to our email newsletter for news and updates

  • Home
  • About RKON
  • Resources
  • Industries
  • Private Equity
  • Technology Services
  • Contact Us
  • RKON’S Digital Privacy

Footer

RKON transparent logo
Find Us on YouTube Find Us on Facebook Find Us on LinkedIn Find Us on Twitter

Subscribe to our email newsletter for news and updates