Skip to content
Search

Got A Question?

Have a specific question about our insights or services? We're here to help! Fill out the form below and our team will get back to you.

Please provide a valid first name (at least 2 characters).
Please provide a valid last name (at least 2 characters).
Please provide a company name.
Please provide a valid email address.
Please provide a valid phone number (at least 10 digits).

Employee Retention Tax Credit FAQs

On September 14th, the IRS announced a processing moratorium on any new Employee Retention Tax Credit (ERTC) claims submitted through…

Understanding the Key Changes in PCI 4.0: What You Need to Know

The Payment Card Industry Data Security Standard (PCI DSS) is a vital framework for securing cardholder data and maintaining payment…

Artificial Intelligence (AI) Is Revolutionizing the Digital World

I attended a conference last week about how Artificial Intelligence (AI) has become an integral part of our lives, transforming…

ERC Processing Moratorium Announced

Over the past year, the IRS has been warning taxpayers about the increasing number of aggressive promoters and marketing companies…

Understanding Utah’s Cybersecurity Affirmative Defense Act

Cybersecurity is a major concern for individuals, businesses, and government agencies alike. Cybercriminal attacks continue to grow at an alarming…

Unmasking the Threat

The Latest Cybersecurity Concerns Surrounding New Fortnite Scams   In the ever-evolving landscape of cybersecurity, threats can emerge from unexpected sources.…

Microsoft Netlogon

We are constantly trying to identify and address vulnerabilities that pose risks to our clients’ systems. One area that has…

MERRY OSBORNE – 40 OVER 40 AWARD

(SALT LAKE CITY, UT – July 10, 2023) Utah Business Magazine has bestowed the Utah’s 40 Women Over 40 Award…

Cybersecurity in the Workplace

How to Keep Your Company and Employees Safe I wrote an article a few weeks ago outlining simple tasks that…

Enhancing Network Security

A Comprehensive Approach to Safeguarding Your Business Cyber threats are evolving rapidly, and businesses must take proactive measures to protect…

Mission Impossible 8

A Thrilling Espionage Spectacle Meets Information Security Expertise This week Tanner, as a firm, went to the new Mission Impossible…

WordPress WooCommerce Payments Bug

Safeguarding Your E-commerce Store As a leading network security consulting firm, our primary goal is to ensure the safety and…

The Value of Well-Documented Policies

Introduction to Policy Business operations policy is essentially a formal communication method. It is specific to individual corporations and applies…