Ashley Watters's Blog Posts

5 Ethical Issues in Technology to Watch for in 2025

Eyes Wide Open: Cybersecurity Lessons for MSPs from an Ethical Hacker

4 Not-So-Hard Ways to Start Your Cybersecurity Trustmark Readiness Path
Given today’s threat landscape, cybersecurity needs to be a top concern for every company. Still,..
‘Tis the Season for Giving Back: GTIA Members Impact Charities Around the World
Every year, GTIA recognizes the holiday season with our annual Giving Program. By providing..
3 Ps to Differentiate Your MSPs Business Focus
MSPs have become a vital service pipeline for companies as they manage increasingly complex..
Taking Your Presentation Skills From Nervous to Natural
It’s no secret that many professionals feel anxiety about presenting or speaking in front of..
Read More >Making Strides in DEI: Fostering Conversations about Inclusivity Initiatives
The past decade, we’ve seen huge strides in diversity, equity and inclusion (DEI). Conversations..
Read More >Blockchain Use Cases and Practical Applications You Should Know
For some, blockchain still feels futuristic—a technology that has far-off implications, but one..
Read More >What Is an Asset Inventory?
An asset inventory is the full documented list that details all of a company’s technology resources..
Read More >7 Types of Business Risk
If you’re running a business, you know that an unexpected incident can be damaging—especially if..
Read More >Using AI in Business: Examples of Artificial Intelligence Application in Business
Artificial intelligence (AI) offers exciting possibilities for businesses. With 35% of companies..
Read More >Why You Should Never Use the Word Breach
People use the word breach all the time. It’s been a familiar phrase in the technology world to..
Read More >Subscribe to the GTIA Community
Not ready for membership yet? Become a subscriber and gain complimentary access to select resources, events and online discussion groups.
Using AI Tools for Content Creation: Everything You Need to Know
Emerging technology tends to generate a lot of buzz—some more than others. One technology in..
Read More >The Importance of Realistic Tabletop Exercises
If you work in technology, you’ve likely taken part in a tabletop exercise. Tabletop exercises are..
Read More >8 Tips for Building Trust Between MSPs and Clients
MSPs rely on excellent cybersecurity practices and positive client relationships to ensure future..
Read More >How to Choose a New Tech Vendor: Evaluations, Security and Success Metrics to Consider
Adding a new vendor or technology to a solution stack can be a frustrating, stressful move for many..
Read More >No One Is a Cyber Expert: Why Info Sharing is Critical
With the number of incidents on the rise every year, there’s little doubt as to why companies are..
Read More >How MSPs Can Talk Tech to Non-Tech Clients
MSPs are often hired to handle technical issues when a business lacks the necessary staff or..
Read More >Key Web3 Statistics You Should Not Miss
Web3 is a term that has gained traction in the last couple of years. Many technology leaders..
Read More >When Good People Become Insider Threats
The business world is fraught with threats that come from both inside and outside. Threats can..
Read More >