• About
  • Partners
  • Contact
  • Blog
  • Company News
  • Media Coverage
  • Careers
  • Resources
fnts-logo-rev-600
fnts-Horizontal_#003DA5
  • Cloud
    • Financial Services Cloud
    • Healthcare Cloud
    • Azure Cloud
      • Microsoft 365
      • Azure Virtual Desktop
    • FNTS Cloud
    • IBM Cloud
      • Power VS Managed Services
      • Data Encryption
    • IBM Power Managment
    • IBM zSeries Cloud
  • Mainframe
    • IBM Mainframe-as-a-Service
    • Mainframe Optimization
    • IBM Remote Management
    • Mainframe Business Cyber Resiliency
    • IBM i Security
  • Managed Services
    • Management of Systems and Networks
    • Application Monitoring
    • Disaster Recovery Services
    • Backup Services
  • Security
    • Virtual CISO
    • Cyber Incident Response Planning
    • SOC-as-a-Service
    • Mainframe Business Cyber Resiliency
  • Business Continuity
    • Disaster Recovery Services
    • Backup Services
  • Consulting Services
    • Business Process Optimization
    • Business Resiliency and Continuity
    • Cybersecurity and Protection
    • Data Analytics and Business Intelligence
    • Product Selection, Procurement and Management
    • IT Project and Change Management
    • Strategic Technology Planning
    • Technology Budgeting and Cost Optimization
    • VMware Cloud Foundation
  • Software Advocacy

Don Pecha, CISO

As Senior Director of Information Security, Don Pecha executes highly effective and balanced information security programs for clients that securely enable business across their technology landscape. He also ensures regulatory compliance, risk mitigation and high-level performance when implementing these programs. A Certified CISO and Certified Ethical Hacker, Don has a deep understanding of threat defense, which has guided his 25-year career in overseeing the security strategy and IT governance of many highly regulated health care, finance and higher education enterprises.

Breaking the Myths: The Truth Behind Cloud Security Risks

 

Optimize Your IT Security Strategy During Cybersecurity Awareness Month with FNTS

October marks Cybersecurity Awareness Month, an ideal time for enterprises to revisit their IT...

AI Shields Up: How Companies Turn the Tide With AI in Cybercrime

Gone are the days when personal, health, and business records were stored on paper and tucked away...

Maintaining Cybersecurity Compliance: An IT Service Provider Can Help

Keeping up with changes to cybersecurity compliance and governance can be challenging because of...

The Role of Cyber Insurance in Risk Mitigation and Disaster Recovery Planning

The rise in remote work environments has opened a Pandora’s box over the past few years, heavily...

Rise of AI-Enhanced Cyberattacks: A New Digital Threat Landscape

The average cost of a data breach in the United States was approximately $9.44 million last year,...

A Comprehensive and Consolidated Approach to Preventing Ransomware Attacks

Ransomware attacks, which are growing in both frequency and sophistication, continue to make...

HIPAA Safe Harbor Law Changes Incentivize Proactive Best Practices to Cybersecurity

New changes to healthcare IT security and compliance are putting greater focus on the need for...

The Secret to Reducing Vulnerability and Risk of Data Breach at Small and Medium-Sized Organizations

In today’s threat landscape, experts say it’s no longer a matter of if a cyberattack will affect an...

Why Heightened Risks Demand More Investment in Information Security

According to Juniper Research, 146 billion records are expected to be exposed in data breaches...

4 Ways an IT Risk Assessment Can Protect Your Organization From Security Threats

Security vulnerabilities in your technology infrastructure are no longer something just for your...

A Quick Guide to Preventing DDOS Attacks

As businesses build their digital fortresses brick by virtual brick, a silent army of compromised...

4 Proactive Measures to Stay Ahead of Cybersecurity Threats

Cybercrime is a continuous threat for organizations of all sizes and across all industries. If...

Using SOAR Technology to Balance Your Cybersecurity Portfolio

Like many other new technologies, the concept of security orchestration, automation, and response...

8 Cybersecurity Trends Shaping 2025

As we move through 2025, cybersecurity continues to evolve rapidly. Organizations now confront more...

Prev 1 2 Next
fnts-logo-rev-600
  • Privacy Policy
  • Contact Us

© 2025 FNTS (First National Technology Solutions)