INTERTEC BLOG

Our Latest Content is on the FPT Blog

Feel free to browse our existing content below, however, if you're looking for the latest articles, we now post them to FPT Software's blog page

Ron Hurle

As CTO and CIO at Intertec International, I'm passionate about leveraging technology to drive smarter business practices. Also a big proponent of aligning internal, augmented, and outsourced resources as strategic advantage for agility and speed. In other words, I encourage people to be resourceful about their resources.


Posts by Ron Hurle

How to Keep Your MSP from Becoming a Security Vulnerability

July 21, 2020 / by Ron Hurle posted in Cyber Security

0 Comments

Hackers sometimes target vendors in order to access their clients' IT, but the right managed cyber security solution can help mitigate that threat.
Read More

5 Key Cyber Security Stats

July 9, 2020 / by Ron Hurle posted in Cyber Security

0 Comments

These cyber security stats show a divide between security operations and wider enterprise strategy--what should CIOs and CISO do about it?
Read More

What to Expect from Your MCSP

July 8, 2020 / by Ron Hurle posted in Cyber Security

0 Comments

Outsourcing your cyber security is often a wise tactic--but what should you actually expect from your MCSP during your engagement?
Read More

Should You Integrate Cyber Security and Quality Assurance?

July 2, 2020 / by Ron Hurle posted in Cyber Security

0 Comments

Cyber security and quality assurance are usually kept in separate silos from a coding and development perspective--but does it have to be that way?
Read More

How to Choose a Cyber Security Solution

June 25, 2020 / by Ron Hurle posted in Cyber Security

0 Comments

Choosing a cyber security solution can be difficult--but there's no better time to do it than right now.
Read More

Can Cyber Security Improve Your Strategic Planning?

June 19, 2020 / by Ron Hurle posted in Cyber Security

0 Comments

Cyber security is increasingly mission critical for enterprise businesses--but can it an integrated cyber security strategy add extra value?
Read More
1
Contact Us