Don Pecha, CISO

As Senior Director of Information Security, Don Pecha executes highly effective and balanced information security programs for clients that securely enable business across their technology landscape. He also ensures regulatory compliance, risk mitigation and high-level performance when implementing these programs. A Certified CISO and Certified Ethical Hacker, Don has a deep understanding of threat defense, which has guided his 25-year career in overseeing the security strategy and IT governance of many highly regulated health care, finance and higher education enterprises.

Navigating Cloud Security

3 min read

Breaking the Myths: The Truth Behind Cloud Security Risks

Although cloud adoption is on the rise, there are still many myths about how secure the technology really is. In fact, according to a study of 250 global CIOs, 30 percent marked cloud security risk as the thing that they are most worried about.

Read More

2 min read

Optimize Your IT Security Strategy During Cybersecurity Awareness Month with FNTS

October marks Cybersecurity Awareness Month, an ideal time for enterprises to revisit their IT security strategies. Staying ahead of the latest...

Read More
AI in Cybercrime

4 min read

AI Shields Up: How Companies Turn the Tide With AI in Cybercrime

Gone are the days when personal, health, and business records were stored on paper and tucked away in locked filing cabinets. Now, organizations are...

Read More
Screen with letters and numbers with the words data breach and cyber attack highlighted. Maintaining cybersecurity compliance

7 min read

Maintaining Cybersecurity Compliance: An IT Service Provider Can Help

Keeping up with changes to cybersecurity compliance and governance can be challenging because of their ever-evolving nature. Organizations face a...

Read More

4 min read

The Role of Cyber Insurance in Disaster Recovery Planning

The rise in remote work environments has opened a Pandora’s box over the past few years, heavily contributing to the increase of cyberattacks and...

Read More

2 min read

Rise of AI-Enhanced Cyberattacks: A New Digital Threat Landscape

The average cost of a data breach in the United States was approximately $9.44 million last year, according to IBM. Most commonly, “bad actors”...

Read More

3 min read

A Comprehensive and Consolidated Approach to Preventing Ransomware Attacks

Ransomware attacks, which are growing in both frequency and sophistication, continue to make national news headlines for crippling organizations...

Read More
doctor of medicine pointing to virtual tablet

2 min read

HIPAA Safe Harbor Law Now Rewards Proactive Cybersecurity Steps

New changes to healthcare IT security and compliance are putting greater focus on the need for cybersecurity best practices in a sector that’s facing...

Read More
FNTS, a leader in IT security, managed services and cloud technology, recently announced the addition of First Protector to its suite of IT security service offerings.

2 min read

The Secret to Reducing Vulnerability and Risk of Data Breach at Small and Medium-Sized Organizations

In today’s threat landscape, experts say it’s no longer a matter of if a cyberattack will affect an organization, but when. Something as simple as a...

Read More
iStock-1163230081

2 min read

Why Heightened Risks Demand More Investment in Information Security

According to Juniper Research, 146 billion records are expected to be exposed in data breaches between 2018 and 2023. IBM and the Ponemon Institute...

Read More
Blog 81 - Featured - F

2 min read

4 Ways an IT Risk Assessment Can Protect Your Organization From Security Threats

Security vulnerabilities in your technology infrastructure are no longer something just for your IT department to worry about; the impact of a...

Read More
Blog 80 - Featured - F

4 min read

A Quick Guide to Preventing DDOS Attacks

As businesses build their digital fortresses brick by virtual brick, a silent army of compromised machines stands ready to unleash chaos at a...

Read More
4 Proactive Measures to Stay Ahead of Cybersecurity Threats

3 min read

4 Proactive Measures to Stay Ahead of Cybersecurity Threats

Cybercrime is a continuous threat for organizations of all sizes and across all industries. If the news surrounding the data breaches at Marriott and...

Read More
Blog 64 - Featured - Final

3 min read

Using SOAR Technology to Balance Your Cybersecurity Portfolio

Like many other new technologies, the concept of security orchestration, automation, and response (SOAR) solutions was born out of a problem that...

Read More
2025 IT Security Trends

5 min read

8 Cybersecurity Trends Shaping 2025

As we move through 2025, cybersecurity continues to evolve rapidly. Organizations now confront more sophisticated threats while struggling to bridge...

Read More