• Home
  • Services
  • About Us
    • Our Team
  • Blog
  • Contact Us
    • Careers
How Using the SLAM Method Can Improve Phishing Detection

How Using the SLAM Method Can Improve Phishing Detection

by zdnconsulting-admin | Sep 29, 2022 | Cybersecurity

There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade or two, it has been the main delivery method for all types of attacks. Ransomware, credential theft, database breaches, and more launch via a phishing...
6 Important IT Policies Any Size Company Should Implement

6 Important IT Policies Any Size Company Should Implement

by zdnconsulting-admin | Sep 22, 2022 | IT Management

Many small businesses make the mistake of skipping policies. They feel that things don’t need to be so formal. They’ll just tell staff what’s expected when it comes up and think that’s good enough. But this way of thinking can cause issues for small and mid-sized...
Did You Just Receive a Text from Yourself? Learn What Smishing Scams to Expect

Did You Just Receive a Text from Yourself? Learn What Smishing Scams to Expect

by zdnconsulting-admin | Sep 8, 2022 | Cybersecurity

How many text messages from companies do you receive today as compared to about two years ago? If you’re like many people, it’s quite a few more. This is because retailers have begun bypassing bloated email inboxes. They are urging consumers to sign up for SMS alerts...

Welcome to our new METRC Consultant and Trainer

by zdnconsulting-admin | Sep 6, 2022 | Uncategorized

We want to welcome Brock Roelofs to the team! Brock will provide consulting and training to our customers using the METRC platform. Brock holds a Bachelor in Biosystems Engineering from Michigan State University and has been working in the Michigan Cannabis Industry...
6 Discontinued Technology Tools You Should Not Be Using Any Longer

6 Discontinued Technology Tools You Should Not Be Using Any Longer

by zdnconsulting-admin | Sep 1, 2022 | Cybersecurity, IT Management

One constant about technology is that it changes rapidly. Tools that were once staples, like Internet Explorer and Adobe Flash, age out. New tools replace those that are obsolete. Discontinued technology can leave computers and networks vulnerable to attacks. While...

Recent Posts

  • How Using the SLAM Method Can Improve Phishing Detection
  • 6 Important IT Policies Any Size Company Should Implement
  • How to Protect Your Online Accounts from Being Breached
  • Did You Just Receive a Text from Yourself? Learn What Smishing Scams to Expect
  • Welcome to our new METRC Consultant and Trainer

Recent Comments

No comments to show.

Get in touch

Call us or send a message.  We look forward to working with you!

Call Us Now:

616-600-4300

Email:

[email protected]

Send a Message

Copyright – ZDN Consulting – All Rights Reserved – Built by WP Harbor