Don Pecha, CISO

As Senior Director of Information Security, Don Pecha executes highly effective and balanced information security programs for clients that securely enable business across their technology landscape. He also ensures regulatory compliance, risk mitigation and high-level performance when implementing these programs. A Certified CISO and Certified Ethical Hacker, Don has a deep understanding of threat defense, which has guided his 25-year career in overseeing the security strategy and IT governance of many highly regulated health care, finance and higher education enterprises.

9 Strategies for Small Businesses to Reduce Data Breech Risks in 2025

8 min read

9 Effective Strategies for SMBs to Reduce Data Breach Risks in 2025

Small and medium-sized businesses (SMBs) face a tough reality in 2025. Cyberattacks targeting SMBs are increasing year over year, with ransomware-as-a-service lowering the barrier for even inexperienced attackers. Furthermore, AI-powered phishing...

Read More
Navigating Cloud Security

3 min read

Breaking the Myths: The Truth Behind Cloud Security Risks

Although cloud adoption is on the rise, there are still many myths about how secure the technology really is. In fact, according to a study of 250...

Read More

2 min read

Optimize Your IT Security Strategy During Cybersecurity Awareness Month with FNTS

October marks Cybersecurity Awareness Month, an ideal time for enterprises to revisit their IT security strategies. Staying ahead of the latest...

Read More
AI in Cybercrime

4 min read

AI Shields Up: How Companies Turn the Tide With AI in Cybercrime

Gone are the days when personal, health, and business records were stored on paper and tucked away in locked filing cabinets. Now, organizations are...

Read More
Screen with letters and numbers with the words data breach and cyber attack highlighted. Maintaining cybersecurity compliance

7 min read

Maintaining Cybersecurity Compliance: An IT Service Provider Can Help

Keeping up with changes to cybersecurity compliance and governance can be challenging because of their ever-evolving nature. Organizations face a...

Read More

4 min read

The Role of Cyber Insurance in Disaster Recovery Planning

The rise in remote work environments has opened a Pandora’s box over the past few years, heavily contributing to the increase of cyberattacks and...

Read More

2 min read

Rise of AI-Enhanced Cyberattacks: A New Digital Threat Landscape

The average cost of a data breach in the United States was approximately $9.44 million last year, according to IBM. Most commonly, “bad actors”...

Read More

3 min read

A Comprehensive and Consolidated Approach to Preventing Ransomware Attacks

Ransomware attacks, which are growing in both frequency and sophistication, continue to make national news headlines for crippling organizations...

Read More
doctor of medicine pointing to virtual tablet

2 min read

HIPAA Safe Harbor Law Now Rewards Proactive Cybersecurity Steps

New changes to healthcare IT security and compliance are putting greater focus on the need for cybersecurity best practices in a sector that’s facing...

Read More
iStock-1163230081

2 min read

Why Heightened Risks Demand More Investment in Information Security

According to Juniper Research, 146 billion records are expected to be exposed in data breaches between 2018 and 2023. IBM and the Ponemon Institute...

Read More
Blog 81 - Featured - F

2 min read

4 Ways an IT Risk Assessment Can Protect Your Organization From Security Threats

Security vulnerabilities in your technology infrastructure are no longer something just for your IT department to worry about; the impact of a...

Read More
Blog 80 - Featured - F

4 min read

A Quick Guide to Preventing DDOS Attacks

As businesses build their digital fortresses brick by virtual brick, a silent army of compromised machines stands ready to unleash chaos at a...

Read More
4 Proactive Measures to Stay Ahead of Cybersecurity Threats

3 min read

4 Proactive Measures to Stay Ahead of Cybersecurity Threats

Cybercrime is a continuous threat for organizations of all sizes and across all industries. If the news surrounding the data breaches at Marriott and...

Read More
Blog 64 - Featured - Final

3 min read

Using SOAR Technology to Balance Your Cybersecurity Portfolio

Like many other new technologies, the concept of security orchestration, automation, and response (SOAR) solutions was born out of a problem that...

Read More
2025 IT Security Trends

5 min read

8 Cybersecurity Trends Shaping 2025

As we move through 2025, cybersecurity continues to evolve rapidly. Organizations now confront more sophisticated threats while struggling to bridge...

Read More