MDRAddress the growing frequency, type, and severity of cyber threats against SMB endpoints
SIEMCentralize threat visibility and analysis, backed by cutting-edge threat intelligence
Risk Assessment & Vulnerability ManagementIdentify unknown cyber risks and routinely scan for vulnerabilities
Identity ManagementSecure and streamline client access to devices and applications with strong authentication and SSO
Cloud App SecurityMonitor and manage SaaS security risks for the entire Microsoft 365 environment.
SASEZero trust secure access for users, locations, and devices
Enterprise-grade SOCProvide 24/7 threat monitoring and response backed by proprietary threat research and intelligence and certified cyber experts
Policy ManagementCreate, deploy, and manage client security policies and profiles
Incident Response ServiceOn-tap cyber experts to address critical security incidents
Cybersecurity GlossaryGuide to the most common, important terms in the industry
Blog Posts by Jason McNew
Principal Solutions Advisor
Jason McNew has 25 years of experience in the field of Information Technology, including 12 years at the White House Communications Agency (WHCA) and Camp David, where he worked on some of the most secure systems in the world, for some of the most important customers in the world. Jason, a United States Air Force veteran, holds a Master’s degree from Penn State in Information Sciences, Cyber Security and Information Assurance, in addition to a Bachelor of Science and two Associate of Science degrees. Jason is also CISSP certified. In 2017, Jason founded Stronghold Cyber Security, helping to get DIB (Defense Industrial Base) contractors CMMC (Cybersecurity Maturity Model Certification) ready. In 2020, Stronghold Cyber Security was acquired by Appalachia Technologies, where Jason served as Senior Engineer, Cybersecurity Compliance and Risk. In 2022 Jason joined ConnectWise’s global security sales team as Principal Solutions Advisor.
Jason lives with his Kurdish wife and five children near Gettysburg PA, in a hewn log home that was built in 1760. His hobbies include home renovation, cars and trucks, and gardening.
4 min read
Enhancing your cybersecurity with a crown jewels analysis
A crown jewels analysis is a cybersecurity method that is used to help determine mission-critical assets in order to better protect the data and information that is most valuable to your business.
4 min read
Build, buy, or partner: The bottom line on 3 paths into cybersecurity
The revenue-generation opportunity in cybersecurity is strong for MSPs—provided they take a fiscally sound route into this market. Learn about the financial impacts of three approaches in this post.