The Markley Network Fabric is allowing these Boston-based biotechs to access scalable, flexible and secure connectivity that is required for their research.
Read MoreArticles by: Technium
[Case Study] Boston Law Firm
Technium was brought in as the security partner to deploy a defense-in-depth strategy to protect the firm
and their clients and stay current with regulatory requirements
Technium Named a 2022 Fast 50 Company
Technium Named a 2022 Fast 50 Company by Boston Business Journal
Read More6 Software Patch Management Mistakes
Hackers spent 2021 wreaking havoc by exploiting software vulnerabilities. What can you do to keep your data safe in 2022?
Read MoreWhat it means to “Be the exception”
Is Technium an MSP? An MSSP? Well, it’s complicated… Read more to see how we fit (and don’t fit) into these categories and how we are an exception to the rule.
Read MoreThat’s a wrap! Technium’s year in numbers.
2021 was a fantastic year for Technium! Let’s let the numbers speak for themselves…
Read MoreInsights From a Female Network Engineer
I realized that being a woman was actually a strength rather than a weakness. I feel it has allowed me to bring a unique perspective and way of thinking to networking problems and to the culture of our team.
Read MoreThe Importance of Technical Documentation
What do you think of when you hear technical documentation? Are you thinking of manuals? How-to guides? Endless papers of technical blueprints? Technical documentation is much more than this—it is about helping customers and engineers effectively and efficiently solve issues that come up.
Read MoreHow to Reduce Risk After Sensitive Data is Leaked
The constant onslaught of data breaches is so exhausting that the term “breach fatigue” has emerged in recent years to describe the public’s growing sense of burnout. While the problem of data breaches can seem overwhelming, the good news is that there are steps every organization can take to reduce risk to their communities, even after a breach.
Read MoreSystems vs. Software
Finding an out-of-the-box software to resolve gaps in your current cyber security state appears easy. The hard part is ensuring the systems and people are in place to do the work.
Read More