Sitemap
Pages
- About
- Application Thank You
- Case Studies
- Contact NEW
- Contact Us
- Contest DEV
- Culture & Careers
- Cyberliability
- Cybersecurity for Manufacturers
- CyberSoundâ„¢
- CyberSoundâ„¢ OLD
- Event Registration
- Executive Leadership
- Frequently Asked Questions
- Happy Holidays
- Home
- Managed Endpoint Detection & Response (MDR)
- Managed Security Service Provider – MSSP DRAFT
- Managed Security Service Provider (MSSP) for Higher Education
- News & Events
- Our Approach
- Our Partners
- Privacy Policy
- Referral Program
- Security Resiliency
- Selecting the Right MDR Provider for Your Security Challenges
- Selecting the Right MDR Provider for Your Security Challenges – Video
- Service Leadership
- Services
- Sitemap
- Terms and Conditions
- Who We Serve
Posts by category
- Category: Capabilities
- Vital Cyber Safety Lessons Taught in West Haven Public Schools through Partnership with the Center for Cyber Safety and Education and Vancord
- 5 Questions to Ask When You Are Choosing an RPO for CMMC Compliance
- Who Needs CMMC Certification? 3 Things to Know
- The Biggest Security Risks Affecting Higher Education Virtual Operations
- K-12 Schools: How to Build a Culture of Data Privacy
- Licensing mode for the Remote Desktop Session Host is not configured
- Category: Case Studies
- Category: Containment
- Category: CyberSound
- Category: Detection
- Category: Events & Webinars
- Vancord, Fortinet, and Exclusive Networks Present: Axe Throwing and Cybersecurity
- FELO Speaker Series – Exploring Craft Beer and Empowering Manufacturing
- Understanding the Managed Detection and Response Landscape, On-Demand Webinar
- Webinar: Selecting the Right MDR Provider for Your Security Challenges
- ICYM: Beers with Engineers Networking at Stony Creek Brewery
- CAIS Annual Conference on Business, Operations & Technology
- Category: Infrastructure
- Category: Monitoring
- Category: News
- MERCYFIRST, LONGSTANDING NEW YORK-BASED NOT-FOR-PROFIT, HONORS VANCORD AS CORPORATE HONOREE
- VANCORD TAKES A GIANT STEP IN CLOUD-FIRST STRATEGY WITH MICROSOFT SOLUTION PARTNERS AZURE INFRASTRUCTURE
- The New Haven Register Interviews Vancord on Recent CrowdStrike Event
- Here’s how to respond to a cyber attack
- Employer shield law boosts cybersecurity interest amid high-profile attacks, litigation
- Vancord at CBIA 2023 Energy & Environment Conference
- Vancord Named on The 2023 Channel Future’s MSP 501 List
- A TikTok Guide to Improve Data Privacy for Employees in Higher Education
- Vancord at NERCOMP Annual Conference 2023
- Vancord Named on 2023 Tech Elite 250 List
- Vancord Featured in The Channel Company’s 2022 Next-Gen Solution Provider Leaders List
- Company Merger Announcement
- Meeting NIST800-171 Compliances in Higher Education
- New Haven Biz talks with Michael Grande about cybersecurity
- Category: Policy
- Category: Restoration
- Category: Security
- Why is Network Security Important?
- How to Foster a Positive Company Culture
- Vancord Named on Managed Service Provider 500
- Will U Be Mine (victim)?
- Navigating Supply Chain Issues in IT
- Data Privacy Day 2023
- How do You Stay Secure & Compliant?
- What is Cybersecurity Maturity Model Certification (CMMC)?
- Cyber Liability is Important, but Not the Only Step
- Cyber Liability Insurance Has Gotten Stricter. Here’s What You Need to Know.
- The Top 3 Questions Every Higher-Ed CIO Should Be Asking
- Data Privacy Day 2020: Data Privacy in Higher Education
- Category: Standards
Cybersound Episodes
- Cybersecurity Awareness Month 2024: Essential Skills and Practical Tips for Personal and Business Safety | CyberSound by Vancord | Ep 115
- Empowering Families: MercyFirst's 130-Year Legacy and the 2024 Angel of Hope Gala ✨ | CyberSound™ Podcast by Vancord | Ep 114
- The Rise of Penetration Testing: Vancord’s Ethical Hacking Solutions for Ultimate Security | CyberSound™ Podcast by Vancord | Ep 113
- Data Governance 101: Common Pitfalls, Mistakes, and Effective Solutions | CyberSound Podcast by Vancord | Ep 112
- IT Asset Disposition for Data Security & Insights with Rocco D'Amico from Brass Valley | CyberSound Podcast by Vancord | Ep 111
- Revolutionizing the Smart Home Industry with Origin Wireless | CyberSound Podcast Vancord | Ep 110
- In The News, August 2024 Cybersecurity Attacks, Breaches & Risk Mitigation | CyberSound Podcast Vancord | Ep 109
- Who's Next in Line: The CISO Succession Plan | 2024
- What's Hot and What's Not in Technology and Culture | 2024
- Independence Day: What Benedict Arnold Can Teach Us About Cybersecurity | 2024
- CyberSoundâ„¢ Vancord's Cybersecurity Podcast 2024 / Information Security Due Diligence 101 / Ep. 105
- Steve Prout: Navigating CMMC Compliance with Vancord for Alpha Q's Success | 2024
- Deepfake and Democracy: Senator Tony Hwang on the Threat of Deepfake and the Need for Legislation
- Defending Manufacturing: Best Practices in OT Security
- Home Smart Home: Security vs. Convenience in IoT
- Securing a Century: Reflecting on 100 Episodes of CyberSound
- Transparent Tech Steering Consent in the AI Age
- Bracket Breakdown Cybersecurity Meets March Madness
- Understanding the Data Privacy Patchwork: What You Need to Know
- The Era of Digital Innovation: Navigating Valentine's Surprises
- Personal Privacy vs. Progress: Implications of the 23andMe Leak
- Banking in the Digital Age: Mastercard’s Security Innovations
- Partnering for Progress: A Spotlight on CBIA
- Tech in a Top Hat: The Frosty AI Conspiracy
- The Pillars of Protection: Risk Strategy, Insurance, and the Key Players
- AI Unveiled: From Basics to Business and Beyond
- Connecticut Senators on the Cutting Edge: AI & Data Privacy in Focus
- The CIO's Dilemma: Proving Value and Driving Strategic Change with CEOs
- Presenting: Vantage Managed Detection & Response (MDR)
- Recent Cyber Attacks in CT: Protecting Your Business from Financial Fraud
- The Human Element of Security Awareness Training
- Demystifying Threat Hunting vs. Incident Response
- Fraud in Higher Education
- MOVEit Vulnerability Exploitation: June, 2023
- Vancord Security Constitution: The Digital Citizen's Guide
- How is AI Transforming Cybersecurity?
- Mandated Cybersecurity Education in K-12 Schools
- Privacy Concerns with TikTok
- NERCOMP 2023 Annual Conference Recap
- Understanding Data Breach Notification Laws
- Security Challenges Facing Operational Technology
- Connecticut Data Privacy Act: Be Prepared
- The Impact of Supply Chain Issues in IT
- Introducing Vantage Protect
- How will ChatGPT Affect Cybersecurity?
- Growing Up Online Part 2: Exploring Technology
- Threat Hunting with Binary Defense
- E-Rate & School Reimbursement Funding
- 2022 Security Year in Review
- eWallets: Approaching a Contactless Future
- White House Announces Important Cybersecurity Measures
- LastPass: The Value of Password Vaults
- Halloween Kill Chain
- Cybersecurity: We're All in This Together
- Cybersecurity Awareness Month: See Yourself in Cyber
- Zero Trust: What is it & How Can I Utilize it?
- Turning the Tables on Attackers
- Backdoors & Breaches
- Untold Stories of a Cybersecurity Engineer
- Finding Privacy in Public Data
- Unpacking the 2022 Ponemon Cost of Insider Threats Global Report
- Vancord and Binary Defense: Two Business Partners in The Industry
- One Year of CyberSound
- Balancing Priorities of Infrastructure and Security
- GLBA Compliance in Higher Ed: Helping to Protect Student Financial Data
- The Cyber Journey To Protecting Sensitive Data: How Evident Must It Be?
- Economic Effects on the Cyber Industry
- Tangible and Intangible Enterprise Risk
- The Hacker Personas
- Revisiting Cybersecurity Fundamentals
- The Latest: June 2022 News Segment
- Identity Crisis: The Give and Takes of Identity-Based Authentication
- What Would You Do? The Value of Acting Out an Attack
- Growing Up Online: How Do I Talk to My Child About Cybersecurity?
- Vancord: Securing a More Connected Future
- The Latest: May 2022 News Segment
- The First 48 Hours: How to Know You've Been Attacked
- April News Segment
- The Ins and Outs of Cyber Warfare
- What Does Network Segmentation Really Mean?
- Secure Access Service Edge
- I'm Understaffed - What Do I Do Now?
- The Mainframe
- Incident Response and Event Automation
- Risk Assessments for Small Business
- Rise Of The Mobile Scam
- Dark Web 101
- Google Do's And Don'ts - How To Protect Your Privacy
- New Requirements to get Insured
- The Main Frame Connecticut Public Act 21-119
- 2022: The Year Ahead Part 2
- A Year In Review Part 1
- Security is Not Optional
- Ransomware Attack: The First 48
- How Does Santa REALLY Know What to Bring You?
- Cyber-Incident Monday
- Preventing the Burnout: Preparing for time off
- Automotive Hacking, Should You be Worried? (Dude, Who Stole My Car?)
- Demystifying AI in Security
- Phishing Redux — Can we trust anything?
- Leadership in Incident Response
- Value of Security Standards
- Cyber Safety First
- Careers in CyberSecurity
- Fight the Phish
- Basic Security Must-Haves: Personal Edition
- Basic Security Must-Haves: Business Edition
- The Evolution of the Cyberattack: Then vs Now
- Security Products - Silver Bullets vs Snake Oil
- The Cost of Security: Changing The Way We Think
- The Main Frame: Supply Chain Attacks
- Cyber Liability Insurance: What is it, and Do I Need it?
- Data Privacy: Do I Need to Comply?
- Ransomware Explained
- The Cybersecurity Fundamentals
Case Studies
Team Members
- Phil Pawelczyk
- Geoffrey Mate
- Tim Mickelson
- Jeff Tagliatela
- Steven Maresca
- Matthew Fusaro
- Anthony Jimenez