The Hidden IT Risk for SMBs During the U.S. Government Shutdown
Discover how the 2025 U.S. government shutdown affects SMB cybersecurity and why now is the time to partner with a trusted MSP like CDML.
Discover how the 2025 U.S. government shutdown affects SMB cybersecurity and why now is the time to partner with a trusted MSP like CDML.
The recent AWS outage exposed how dependent businesses are on single providers. Learn how to build true redundancy—multi-cloud, multi-ISP, on-prem backup—to keep your company running when others go dark.
SonicWall’s recent SSL VPN and MySonicWall backup breaches expose serious risks to business data. Learn why CDML recommends CDML Remote Access with MFA as a safer remote access solution.
Click here to view/listen to our blogcast. Today (October 14, 2025), Microsoft officially ends support for Windows 10. Your PCs won’t stop working but they’ll stop being protected. For healthcare providers, financial firms, and other businesses regulated under Department of Health (DoH) or Department of Financial Services (DoF) rules, that’s not just a technical issue […]
Discover the three pillars of cybersecurity every organization needs: Policy, Technology, and Culture. Learn how to strengthen your defenses and build a security-first workplace.
Click here to view/listen to our blogcast. In Part 1 of our HIPAA Compliance Series, we focused on healthcare providers – the front line of patient data protection. But even the most diligent provider can be undone by a vendor who fails to secure Protected Health Information (PHI). Under HIPAA, these vendors are called business […]
Click here to view/listen to our blogcast. Imagine an email that looks flawless—no typos, no awkward phrasing, perfectly branded to mimic your vendor. Thanks to AI, scammers can now generate these fake requests in seconds. One click by your accounts payable team to update a bank account, and your organization could be out hundreds of […]
Click here to view/listen to our blogcast. When it comes to HIPAA compliance, healthcare providers sit squarely in the spotlight. Regulators aren’t only watching – they are penalizing. Recent settlements show that no organization is too big or too small to be fined. From improper disposal of patient charts to ransomware crippling outpatient centers, the […]
Click here to view/listen to our blogcast. When peripheral devices like Internet-connected cameras or other IoT gear have unpatched vulnerabilities, they become easy entry points for attackers. A recent example involved a flaw in an LG LNV5110R camera that allowed administrative access even after the product reached end-of-life. This incident underscores a critical truth: relying […]
Click here to view/listen to our blogcast. If you’re still using an older PC whether it’s running Windows 10 or an earlier version of Windows 11 it’s time to act. Microsoft will end support for Windows 11 version 23H2 (Home and Pro editions) on November 11, 2025. That’s just around the corner. Even more pressing: […]