cybersecurity

9 articles tagged "cybersecurity" — strategic IT insights for North Carolina businesses.

The Preferred Data team writes for North Carolina small businesses, manufacturers, and defense contractors from our base in High Point, NC. Below is every post on cybersecurity. Need help applying any of this to your own environment? Talk to PDC at (336) 886-3282.

Cover Image for SharePoint Zero-Day CVE-2026-32201: How NC Businesses Should Respond

SharePoint Zero-Day CVE-2026-32201: How NC Businesses Should Respond

Microsoft's April 2026 Patch Tuesday fixed an actively exploited SharePoint spoofing flaw (CVE-2026-32201). Learn what NC small businesses need to do this week.

Cover Image for SonicWall SNWLID-2026-0004: 3 Critical Firewall Flaws NC Businesses Must Patch Now

SonicWall SNWLID-2026-0004: 3 Critical Firewall Flaws NC Businesses Must Patch Now

SonicWall disclosed three SonicOS vulnerabilities April 29, 2026 affecting Gen6, Gen7, and Gen8 firewalls. Learn what NC small businesses must do to avoid compromise.

Cover Image for CMMC 48 CFR Final Rule: NC Defense Contractors Have 6 Months to Phase 2

CMMC 48 CFR Final Rule: NC Defense Contractors Have 6 Months to Phase 2

The CMMC 48 CFR final rule went live November 10, 2025. Phase 2 begins November 2026 requiring third-party assessments. Learn what NC small businesses must do now.

Cover Image for NPM Supply Chain Attacks Hit Businesses in 2026: Axios, Bitwarden CLI, and SAP Compromised

NPM Supply Chain Attacks Hit Businesses in 2026: Axios, Bitwarden CLI, and SAP Compromised

Three major npm supply chain attacks compromised Axios, Bitwarden CLI, and SAP packages in 2026. Learn how NC small businesses can detect and defend against software supply chain threats.

Cover Image for Google API Keys Now Expose Gemini AI Data: What North Carolina Businesses Need to Know

Google API Keys Now Expose Gemini AI Data: What North Carolina Businesses Need to Know

A newly disclosed vulnerability allows previously harmless Google API keys to authenticate to Gemini AI and access private business data. Learn the risk, who is affected, and how to protect your NC or…

Cover Image for Post-Quantum Cryptography: Why North Carolina Businesses Should Start Preparing Now

Post-Quantum Cryptography: Why North Carolina Businesses Should Start Preparing Now

Quantum computing threatens to break today's encryption within a decade. Attackers are already harvesting encrypted data for future decryption. Learn the practical 4-phase PQC preparation roadmap for …

Cover Image for Ransomware Payments Drop to 28% Record Low Even as Attacks Surge 50%: What NC Businesses Must Know

Ransomware Payments Drop to 28% Record Low Even as Attacks Surge 50%: What NC Businesses Must Know

New Chainalysis data shows ransomware payment rates hit an all-time low of 28%, but attacks surged 50% year-over-year with $820M+ in payments. Learn what separates businesses that recover without payi…

Cover Image for The AI Revolution Hitting America's Main Street: What Small Businesses Need to Know

The AI Revolution Hitting America's Main Street: What Small Businesses Need to Know

Discover how artificial intelligence is transforming manufacturers, distributors, industrials, and construction companies, and why partnering with experts is critical to staying competitive in 2025 an…

Cover Image for The Acquirer's Advantage: Your Essential IT Due Diligence Checklist

The Acquirer's Advantage: Your Essential IT Due Diligence Checklist

Before you sign the deal, uncover the hidden technology risks and opportunities. This essential IT due diligence checklist for SMB acquisitions helps buyers assess infrastructure, cybersecurity, softw…

Support