Andrew Edstrom

Andrew Edstrom
has over 20 years of network engineering and information technology experience. For over 11 years he has focused on IT Security and Compliance. He has a proven history of leading successful security teams and programs within a Cloud Service environment, specializing in security education, program design and architecture, compliance, and privacy network vulnerability assessments. An expert on the application of Risk Management, WISP, HIPAA and PCI-DSS. He has a passion for helping the organizations understand the why, what, when and how of security.

Cyber Security Awareness Training: What You Need to Know

Cyber security is a vital component of all our everyday operations. Being ready to protect your business against a host of potential threats in order to carry on with normal functions has never been so important. While many focus on interdicting threats and rebuilding after a threat has struck, ...

Read More

Compliance in the Legal Industry

How to make your law firm SOC 2 compliant with minimal headaches

Read More

Cyber Security Priorities for the Mid-Sized Business: Your Threats Are Often Unique

The mid-sized business is a unique and often improperly appreciated animal in the business field. Its goals, concerns, and even threats are wholly different from those seen at the small business and enterprise levels. Too often, mid-sized businesses are lumped in with small businesses to be ...

Read More

Cloud Security: The Ins and Outs of This Powerful New Protection System

Even just a few years ago, the notion that the cloud would ever be much more than an alternate storage vector for less-than-crucial data was almost outlandish. It didn't take long, however, before new opportunities emerged, and provided users with a banquet of new possibilities to choose from. ...

Read More

Discover Eye-Opening Insights Hidden in Your Data with Power BI

Whether your corporation operates in the sphere of healthcare, finance, insurance, or another industry, you likely want to know as much as possible about your company’s inner workings. But not all IT departments have the budget to hire a team of data scientists to crunch numbers around the ...

Read More

Healthcare Security and the Cloud: Risks, Rewards, and Making the Most of It All

The development of cloud-based systems, from the Internet of Things (IoT) to standard software-based matter, has led to a great many advances and useful technologies for all manner of businesses. While healthcare businesses are certainly included, they need to be mindful of the security risks ...

Read More

PCI Compliance Standards: A Difficult but Vital Path to Success

When we go out shopping, we have certain expectations. One of these is that our payment card data will be treated with a certain level of responsibility. Expecting our data to remain safe should be a foregone conclusion, but it isn't always. That's what the Payment Card Industry's (PCI) standards

Read More

How to Keep IoT Security Problems from Interfering in IoT Value

Perhaps one of the biggest technological developments of the 21st century so far is the Internet of Things (IoT). With already-widespread and growing use, more and more industries are finding a role for these systems in everyday operations. Healthcare is no exception, and within the broader ...

Read More

Stop Planning for the Last War: How to Make Your Security Plans Match Reality

Generals always plan to fight the last war. While there isn't really an originator for this aphorism—it's been traced to two or three different sources at roughly the same time frame—it's a valuable piece of cautionary wisdom all the same. Many IT professionals in mid-market businesses find ...

Read More

The Top Nine Security Gaps for Mid-Market Businesses

The risk of security breaches for mid-market businesses cannot be overstated. The last few years have shown that no business -- no matter the size -- is completely safe from external or internal threats. So, while some enterprises are trying their utmost to keep up with the latest security ...

Read More
1 2

Phishing Malware

Can your employees differentiate between a legitimate email and targeted phishing?

92% of malware was delivered through email in 2018.  And Phishing emails are the #1 method of deploying malware.  Contact us today to learn more about our Phishing Awareness Training.

Learn More

About UTG

UTG is a Mid-Market Managed Service Provider that partners with your organization to leverage technology strategically.  We help you meet company objectives, increase efficiencies and productivity through technology.

Categories

See all