Category: Uncategorized

7 Customer-Facing Technologies to Give You an Advantage

PICPA 2023 Conference: CFO & Cybersecurity Speakers

Morefield at the Pennsylvania Institute Of Certified Public Accountants 2023 Conference

We are honored to have had our Chief Financial Officer (CFO), LeeAnne Stump, and Virtual Chief Information Security Officer (vCISO), Allan Jacks, participate in this year’s conference discussing being a strategic leader and cybersecurity in the financial industry.

LeeAnne teamed-up with Elizabeth Wilson, Chief Financial Officer at Valley National Financial Advisors to discuss the role of CFO: The Strategic Leader and Allan will be leading a session on Cybersecurity: What You Really Need and Why.

Thursday, March 23, 2023

12:25 p.m. – Cybersecurity: What You Really Need and Why

Allan Jacks, Virtual Chief Information Security Officer (vCISO), Morefield

  • Cybersecurity: past and future
  • Discuss a three-pronged approach to cybersecurity: technology, processes, and people
  • Dive into the motivations for cybersecurity; compliance requirements, insurance requirements, privacy requirements (H.R. 8152 (ADPPA), PA HB 2202, PA HB 1126, PA HB 2257) and due care vs. due diligence

3:10 p.m. – CFO: The Strategic Leader

LeeAnne Stump, Chief Financial Officer, Morefield & Elizabeth Wilson, Chief Financial Officer, Valley National Financial Advisors

  • Collaborative strategic alliances – Create, develop, and nurture both internal and external relationships
  • Self awareness – Recognize that it takes a village
  • Knowledge sharing – Get everyone to “think like an accountant”
  • Importance of data – Drive effective decision making
  • Reality check – Viability, value, and resources
  • Stakeholder communication – Know your audience
  • 4 orientations of the CFO role – responder, challenger, architect, transformer

Learn more at –

4 Proven Ways to Mitigate the Costs of a Data Breach

No business wants to suffer a data breach. But unfortunately, in today’s environment, it’s difficult to completely avoid them. Approximately 83% of organizations have experienced more than one data breach. (IBM Security 2022 Cost of a Data Breach Report) These breaches hurt businesses in many ways. First, there is the immediate cost of remediating the breach. Then, there are the lost productivity costs. You can add lost business on top of that, and lost customer trust. A business could also have extensive legal costs associated with a breach. According to IBM Security’s report, the cost of a data breach climbed again in 2022. The global cost of one breach is now $4.35 million, up 2.6% from last year. If your business is in the U.S., the cost rises to $9.44 million. In Canada, the average data breach costs companies $5.64 million. Costs for smaller companies tend to be a little lower. But breaches are often more devastating to SMBs. They don’t have the same resources that larger companies do to offset all those costs. It’s estimated that 60% of small companies go out of business within six months of a cybersecurity breach. Companies don’t need to resign themselves to the impending doom of a data breach. There are some proven tactics they can take to mitigate the costs. These cybersecurity practices can limit the damage of a cyberattack. All these findings come from the IBM Security report. They include hard facts on the benefits of bolstering your cybersecurity strategy.

Cybersecurity Tactics to Reduce the Impact of a Breach

Use a Hybrid Cloud Approach

Graph from: IBM Security/Ponemon Institute 2022 Cost of a Data Breach Report

Most organizations use the cloud for data storage and business processes. Researchers found that 45% of all data breaches happen in the cloud. But all cloud strategies are not created equally. Breaches in the public cloud cost significantly more than those in a hybrid cloud. What is a hybrid cloud? It means that some data and processes are in a public cloud, and some are in a private cloud environment. What some may find surprising is that using a hybrid cloud approach was also better than a private cloud. Graph from: IBM Security/Ponemon Institute 2022 Cost of a Data Breach Report

Put in Place an Incident Response Plan & Practice It

You don’t need to be a large enterprise to create an incident response (IR) plan. The IR plan is simply a set of instructions. It’s for employees to follow should any number of cybersecurity incidents occur. Here is an example. In the case of ransomware, the first step should be disconnecting the infected device. IR plans improve the speed and effectiveness of a response in the face of a security crisis. Having a practiced incident response plan reduces the cost of a data breach. It lowers it by an average of $2.66 million per incident.

Adopt a Zero Trust Security Approach

Zero trust is a collection of security protocols that work together to fortify a network. An example of a few of these are:

• Multi-factor authentication

• Application safelisting

• Contextual user authentication

Approximately 79% of critical infrastructure organizations haven’t adopted zero trust. Doing so can significantly reduce data breach costs. Organizations that don’t deploy zero trust tactics pay about $1 million more per data breach.

Use Tools with Security AI & Automation

Using the right security tools can make a big difference in the cost incurred during a data breach. Using tools that deploy security AI and automation brought the biggest cost savings. Data breach expense lowered by 65.2% thanks to security AI and automation solutions. These types of solutions include tools like advanced threat protection (ATP). They can also include applications that hunt out threats and automate the response.

How to Get Started Improving Your Cyber Resilience

Many of these ways to lower data breach costs are simply best practices. You can get started by taking them one at a time and rolling out upgrades to your cybersecurity strategy. Working with a trusted IT provider, put together a roadmap. Address the “low-hanging fruit” first. Then, move on to longer-term projects. As an example, “low-hanging fruit” would be putting multi-factor authentication in place. It’s low-cost and easy to put in place. It also significantly reduces the risk of a cloud breach. A longer-term project might be creating an incident response plan. Then, you would set up a schedule to have your team drill on the plan regularly. During those drills, you could work out any kinks.

Need Help Improving Your Security & Reducing Risk?

Working with a trusted IT partner takes a lot of the security burden off your shoulders. Give us a call today to schedule a chat about a cybersecurity roadmap.



Article used with permission from The Technology Press.

What Is Secure Access Service Edge (SASE) and Why It’s Important

[4 min. read]

Secure access service edge (SASE) is helpful for many companies considering digital transformation. If you’re looking for a way to upgrade your network security, SASE may be right for your organization.

This post will define SASE, explain how it works and detail the benefits it can bring your company.

What Is SASE?

Experts simply define SASE as a cloud-native security framework that blends wide area network (WAN) features with cloud security technologies to build secure connections between users and your internal network.

SASE — pronounced like “sassy” — combines various network security technologies into one comprehensive solution. This solution enables more efficient remote work and simplifies your tech stack, key steps toward a successful digital transformation.

It’s important to distinguish SASE from other forms of edge computing. SASE is often mistaken for security service edge (SSE), which is a SASE subcategory that focuses on security services.

How Does SASE Work?

SASE works by inspecting user traffic at a security enforcement point near them, which shifts the focus off your data center and onto your users. This change makes connecting to your applications and services safer and more efficient.

Rather than forwarding web traffic all the way to your data center and back, SASE sends user connections to a nearby enforcement point for inspection. Once approved, the user can securely connect to the destination.

In contrast, legacy system security checks take place in on-premises firewall hardware. While this model works well for in-house teams, it’s inefficient for remote and distributed users. And as people begin working from home more often, companies must find new ways to improve the remote user experience to stay competitive.

Essentially, SASE checks your user or system where they are instead of waiting for their connection to reach your network.

Breaking Down the SASE Model

The SASE architecture consists of six key components. Each component is essential to the SASE model and enables a secure connection.

1. Software-Defined Wide Area Network (SD-WAN)

An SD-WAN network is an overlay network, which means that it is constructed on top of another network’s infrastructure. This virtual architecture eliminates the constraints of a physical network, which allows it to provide extra networking flexibility and optimize the user experience.

In SASE, the SD-WAN maps the most efficient route to the destination data center, cloud application or internet server from the user’s device. This function enables you to quickly deploy new applications and services while managing uniform policy across various locations.

2. Secure Web Gateway (SWG)

As the intermediate stop between your users and your network, the SWG prevents unsecured access to your network. When users attempt to access your applications, the SWG inspects their requests against your company policy to prevent malicious entities from reaching your internal network.

This boundary shields both your users and your network from cyber threats such as web-transmitted viruses, vulnerable websites and malware.

3. Cloud Access Security Broker (CASB)

A CASB is a cloud-based security enforcement point located between your users and your network that ensures safe access to your internal applications and services. It also works for any SaaS applications you use.

CASBs include various types of enforcement, including:

  • Single sign-on (SSO)
  • Tokenization
  • Encryption
  • Device profiling
  • Credential mapping
  • Malware detection
  • Logging

4. Firewall as a Service (FWaaS)

A FWaaS solution replaces physical firewall hardware with a cloud-based version. These solutions provide your network with advanced next-generation firewall (NGFW) capabilities and access controls such as:

  • Advanced threat protection
  • Domain name system (DNS) security
  • URL filtering
  • Intrusion prevention systems (IPS)

5. Zero Trust Network Access (ZTNA)

ZTNA is a critical part of SASE architecture. As the name implies, it does not trust any user — the ZTNA framework requires constant authorization, authentication and validation of all users before granting access to any of your applications or data.

This framework enables remote users to connect securely to your applications without needing to be on your network, which protects them from exposure to the internet at large.

6. Centralized Management

The ability to manage all these components from one central console streamlines your tech stack and improves visibility, eliminating many of the challenges that come with legacy architecture. A unified management console also enables you to deliver consistent connectivity across your organization regardless of your users’ physical locations.

Pros and Cons of SASE

Understanding the potential benefits and downsides of SASE architecture can help you determine whether it is a good fit for your company.

Benefits of SASE

Here are some of the primary benefits of implementing a SASE framework:

  • Simplified networks: Unlike virtual private networks (VPNs), SASE solutions do not require users to download additional software to connect to your network. This simplifies the connection process and reduces your IT costs.
  • Reduced cybersecurity costs: When you can streamline your tech stack, you can save money on security solutions. For example, a FWaaS eliminates the need for physical firewall hardware, expanding your security system’s reach and reducing infrastructure costs.
  • Seamless user experience: As a cloud-based solution, SASE manages connections at key exchange points in real-time. This capability optimizes connections and minimizes latency, providing a superior user experience to VPNs. This is especially true for multi-cloud environments.
  • Decreased risk: SASE is a cloud-native framework, so it’s more capable of addressing new challenges as computing becomes increasingly distributed.
  • Scalability: Cloud-native solutions are highly scalable, so they can quickly scale to meet increasing demand as your business grows.

Cons of SASE

As with any technological solution, other solutions fit certain use cases better than SASE. Here are some examples:

  • Complex integration: If you plan to use tools from multiple different manufacturers, trying to connect them all under the SASE umbrella can introduce new complexities into the system.
  • New technology: Because the SASE framework is fairly new, some of its components are still developing. Some companies find themselves running into unexpected limitations in certain areas. For example, SASE can only integrate existing technologies at the moment.
  • Limited IT options: Because SASE creates a unified solution, it limits a company’s ability to source solutions from multiple vendors, which may be a disadvantage for some organizations.
  • Learning curve: Implementing a SASE framework may require you to reskill or upskill your existing IT team, which can cost you significant effort, money and time up front.

Discussing your needs with a well-established IT consulting firm can help you determine whether SASE is right for your company.

Contact Morefield for More Information

SASE can help drive your business toward digital transformation and simplify your security tech stack when implemented properly. If you’re considering adopting a SASE framework, the experts at Morefield are here to help.

We help organizations in various industries integrate and enhance their technology to boost productivity and efficiency. Whether you’re looking for an individual product to add to your existing system or a fully integrated solution, we can help you find the right technologies to meet your organization’s unique needs.

With more than 70 years of experience in IT, you can count on Morefield to provide unparalleled service and expertise. Contact our team today for more information about our technology services.

Morefield Achieves Cisco Gold Provider Status

Only MSP in Pennsylvania to hold Powered Service designations in three Cisco Meraki specialties

October 24, 2022 (Camp Hill, PA) – Morefield, a Managed Service Provider and technology company, proudly announces it earned the designation of Cisco Gold Provider, with capabilities in three Cisco Powered Services: Meraki Access, Meraki SD-WAN, and Meraki Security.

Morefield earned the Cisco’s Gold level designation, after a rigorous review of their capabilities of enhanced support throughout their managed services practice. Cisco evaluated Morefield on its ability to meet specific metrics and key performance Indicators (KPIs) around expertise in delivering best in class solutions for clients. The solutions include Cisco’s Meraki offerings, end-to-end client incident management and process, and exceptional client satisfaction. Cisco’s Gold Provider audit verifies these deliverables ensuring reliability, security, and support throughout the company including, technical support, sales, marketing, project management, accounting, human resources, and leadership.

“We are excited and proud of our team on this great achievement. We are continuously looking for ways to grow our MSP practice to provide our clients the best technology solutions that manage risk and accelerate digital transformation within their organizations,” remarked Wes Kelly, President of Morefield. “Cisco’s portfolio provides services and solutions for flexible and dynamic infrastructures that can evolve with the needs of our clients. I’m proud of our talented team for achieving this level of recognition by Cisco so that we can take our clients to the next level of service and solutions.”

As a Cisco Gold Provider, Morefield is at the highest level of knowledge and skills required to implement Cisco solutions. Morefield has been a Cisco partner for over 25 years. In addition to Gold Provider status, the company is a Premier Integrator and holds specializations in Cisco Advanced Collaboration Architecture, Cisco Webex Calling, and Cisco Webex Contact Center.

Morefield is the only Gold Provider in Pennsylvania to hold Powered Service designations in these three Meraki specialties. There are less than ten companies nation-wide that hold Cisco Gold Provider role with Power Services credentials in Meraki Access, Meraki SD-WAN, and Meraki Security.


Cisco Gold Provider Status Official Press Release

Briana Carr
Morefield Marketing Manager

Sign Up for Our Newsletter