Blog

All things security

Have questions on MDM, EDR, or other enterprise security topics? We've
got you covered!
Categories
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
How To Guide

From Technical Debt to Baseline: 5 Ways to Automate Your Security

This article outlines a clear, automated five-step path to move from technical debt (and security risk) to a stable, enterprise-ready baseline, without relying on constant oversight.
Josh Zweig
January 30, 2026
5 min read
Security

Still Managing Security Manually? Here’s the Path to Automation

In this blog, we’ll explain security configuration management and why manual approaches stop working as companies grow. We’ll also cover how automated enforcement helps you maintain security baselines, reduce deployment risks, and stay confident in your security posture over time.
Josh Zweig
January 29, 2026
5 min read
How To Guide

How You Know You’re Ready for Your First IT or Security Hire

For most growing companies, the first IT or security hire doesn’t come from a big “aha” moment. Instead, it’s a decision shaped by the gradual build-up of operational friction, compliance demands, and the need to manage risk as the business scales. This article is designed for COOs, business leaders, and decision-makers at growing companies who are evaluating when and why to make their first IT or security hire. Understanding the right timing and rationale for this critical step is essential for ensuring business continuity, maintaining compliance, and effectively managing organizational risk.
Josh Zweig
January 20, 2026
5 min read
Identity Solution

Identity Access and Device Management: A Simple Model for Modern SMB Security

We break down identity access and device management basics, and explain why bringing them together using automation is a great way to set up simple but effective security, especially for small and mid-sized business (SMB) leaders. We'll explain why traditional security approaches often fail to keep up with organizational change, and how a simple, unified model can reduce risk and support compliance, without adding workload.
Josh Zweig
January 12, 2026
5 min read
SOC2

Navigating Compliance: 3 Tools to Secure SOC 2 Success

To help first-time organizations navigate the SOC 2 auditing process, we sat down with Ryan Johanson, CEO of Johanson Group.
Josh Zweig
October 3, 2025
5 min read
Security

The 3-Step Path to Security Maturity

This tactical guide is designed for small and mid-sized organizations asking those exact questions.
Josh Zweig
October 6, 2025
5 min read
MDM

What Is Mobile Device Management (MDM)?

Mobile Device Management (MDM) is the foundational control behind modern security programs. It provides teams with the visibility and enforcement they need to establish device trust and maintain a consistent security baseline as environments evolve and change.
Josh Zweig
September 10, 2025
5 min read
Company

Securing the Full Stack: Zip Security and Galvanick Announce Strategic Partnership

Zip Security and Galvanick are now partnering to provide unified cybersecurity across both Information Technology (IT) and Operational Technology (OT) environments.
Perry Rahman-Porras
June 10, 2025
5 min read
How To Guide

Intune Tune-Up: 11 Quick Fixes for Stronger Security

Get your Intune setup in top shape with these high-impact adjustments and audit recommendations.
Josh Zweig
February 11, 2025
5 min read