Quantcast
Channel: Thrive
Browsing all 169 articles
Browse latest View live

Thrive Named Middle Market Dealmaker of the Year by Boston Business Journal

“Many middle market companies are struggling with the complexity of technology, cybersecurity, and work from home issues since the pandemic and need a true partner to help them augment their overtaxed...

View Article


Safeguarding Your SME Business: Navigating the Rising Tide of Cyber Threats

Every day, the impact of cunning cyber attackers on small to medium sized enterprises like yours increases rapidly. From vulnerabilities in your supply chain to a potentially incomplete response plan,...

View Article


Continuous Threat Exposure Management (CTEM) Explained

The evolution of cyber threats and the ingenuity of cyber criminals require organizations to address vulnerabilities before they can be exploited. However, it’s not realistic to patch every exposure...

View Article

The Change Healthcare cyberattack: lessons for data security

The effects of the Change Healthcare cyberattack have rippled through the health care sector over the past few months, leading to outages, payment delays, and even cancellation of patient appointments....

View Article

Thrive Spotlight: Mark Lopshire – Strategic Account Executive, Private Equity...

Welcome back to another installment of our “Thrive Spotlight” blog series. Our featured employee is Mark Lopshire, Strategic Account Executive, Private Equity Group.  In his position he manages a...

View Article


The Risks of Neglect: Celebrating Identity Management Day

Since 2021, Identity Management Day has been celebrated annually as an event dedicated to raising awareness about the importance of protecting personal information online. Held on the second Tuesday of...

View Article

Image may be NSFW.
Clik here to view.

Optimizing Operations for Portfolio Companies

As portfolio companies harness digital technologies to drive growth and innovation, they become increasingly reliant on cloud computing and interconnected systems to streamline operations and enhance...

View Article

Image may be NSFW.
Clik here to view.

Navigating Smooth Waters: How Thrive Transformed Transmarine Navigation’s IT...

Download Now   Transmarine Navigation, part of the Horizon Group, specializes in providing port agency management services and addressing the requirements of shipping companies globally. This case...

View Article


Dress Rehearsal for Disaster: Why Your Business Needs an Incident Response...

The Phantom of the Opera is the longest-running show on Broadway with over 13,000 performances and a 35-year tenure performing to packed houses. From its initial run in London back in 1986 before...

View Article


Thrive Spotlight: David Bloomer – Director, Technical Advisory Services – New...

Welcome back to another installment of our “Thrive Spotlight” blog series. Our featured employee is David Bloomer, Director, Technical Advisory Service – New York Financial Services.  In his position,...

View Article

AI-generated Cyber-attacks: A New Emerging Threat

As AI technology continues to advance at an unprecedented rate, UK businesses face a new and formidable challenge in cybersecurity. A new wave of threats has arisen, posing substantial risks to...

View Article

Image may be NSFW.
Clik here to view.

Empowering Education: How Thrive Fortified CBT Technical Institute’s IT...

Download Now   CBT Technical Institute offers technical training and certification programs in various fields, such as information technology, cybersecurity, network administration, and more. The...

View Article

Thrive Spotlight: Ryan Goodwin, Architect, Public Cloud Services

Welcome back to another installment of our “Thrive Spotlight” blog series. Our featured employee is Ryan Goodwin, an Architect of Public Cloud Services, who focuses on defining and standardizing Thrive...

View Article


Image may be NSFW.
Clik here to view.

AI Policy Template

Be sure to establish Data Governance and Privacy Protocols. Business and IT leaders must approach the integration of Copilot and similar AI solutions with extreme caution and foresight. The allure of...

View Article

Image may be NSFW.
Clik here to view.

Incident Response Planning Guide

Ensure Cyber Incidents Don’t Becomes Cyber Disasters. Plan ahead to stay ahead. Cyber threats are everywhere, and in today’s digital landscape, it’s imperative to stay on top of your technology stack....

View Article


Stay Ahead of Cyber Threats with Thrive’s Dark Web Monitoring

Cyber attacks are becoming increasingly frequent and more complex, so it’s vital to be proactive and lower the odds of a successful breach. That’s why Thrive now offers a Dark Web Monitoring service....

View Article

Unify Your Business Communications with Microsoft Teams Phone

As remote work continues to surge in popularity, it’s more important than ever to ensure that your team is communicating effectively and efficiently. There are a myriad of options to choose from making...

View Article


Balancing the rewards and risks of AI tools

AI’s promise of time and money saved has captivated employees and business leaders alike. But the real question is… is it too good to be true? As enticing as these rewards may be, the risks of this new...

View Article

Image may be NSFW.
Clik here to view.

Is your organization prepared for NIST 800.171 Certifications (CMMC)?

The Cybersecurity Maturity Model Certification (CMMC) program is aligned to DoD’s (Department of Defense) information security requirements for DIB (Defense Industrial Base) partners. It is designed to...

View Article

Microsoft Copilot Planning: Ensure a Successful Generative AI Deployment

The introduction of generative AI has led to remarkable efficiency gains for professional teams across a variety of industries and job functions. At the forefront of this change is Microsoft’s Copilot...

View Article
Browsing all 169 articles
Browse latest View live