Security
You Can’t Secure What You Didn’t Inventory
Cybersecurity programs often focus on tools, alerts, and incident response. But one foundational challenge continues to undermine security efforts across organizations: Lack of asset visibility. In this episode of Data Security over Coffee, Reclamere’s Joe Harford and Angie Singer Keating sit down with Patrick Costello, Partner Account Manager at Cynomi, to discuss why asset inventory…
Read MoreThe Hidden Costs of Shadow IT: How Unmanaged Assets Increase Cyber Risk
Shadow IT rarely begins with malicious intent. It usually starts with convenience. An employee shares documents through a personal cloud storage account. A department adopts a new SaaS tool without notifying IT. A team uses an unauthorized messaging platform to accelerate communication. These decisions are often made to improve productivity. However, they introduce unmanaged risk.…
Read MoreAsset Visibility Is the Foundation of Cybersecurity: Why ITAM Matters in 2026
Cybersecurity conversations often focus on tools, alerts, and threat intelligence. However, the most critical control in any security program is far less complicated. It is visibility. If you do not know what assets exist in your environment, you cannot protect them. As organizations expand across cloud platforms, SaaS applications, remote endpoints, and third-party integrations, asset…
Read More
Cybersecurity & Your Tech’s Retirement Party
(Spoiler: Security Matters)
When laptops, servers, and devices reach end of life, the cyber risk doesn’t disappear – it often increases. In this episode of Data Security over Coffee, Reclamere’s Joe Harford and Angie Singer Keating are joined by Jason Teliszczak, CEO & Founder of JT Environmental Consulting, for a practical, no-fear discussion on why IT Asset Management…
Read MoreYou Can’t Secure What You Can’t See: The Role of ITAM in Cyber Resilience
Why Asset Visibility Has Become an Existential Issue for SMBs Cybersecurity conversations often start with tools: firewalls, EDR, SIEM, vulnerability scanners. But for many small and mid-sized businesses (SMBs), breaches don’t happen because they lack tools – they happen because those tools are operating without visibility. In the U.S., 53% of IT teams lack complete…
Read MoreFrom Core Systems to Copiers: Why IT Asset Visibility Is a Bank’s First Line of Defense
The Cyber Risk Most Banks Don’t See Until It’s Too Late When banks think about cybersecurity risk, attention naturally gravitates toward core banking platforms, online banking systems, and customer-facing applications. These systems are critical, but they’re not where many incidents begin. In reality, some of the most damaging security failures start with assets that never…
Read MoreWhy Unmanaged Medical Devices Are a Growing Cyber Risk in Healthcare
The Patient Safety Impact Most Cybersecurity Conversations Miss In May 2017, a ransomware attack disrupted healthcare delivery across the UK. In just 12 hours, more than 19,000 medical appointments were canceled, including 139 for suspected cancer patients. Emergency departments closed. Diagnostic equipment went offline. Care was delayed, not because clinicians lacked skill, but because medical…
Read MoreFamily, Community, and Cyber Resilience
How do community organizations protect sensitive data while supporting vulnerable populations? In this year-end episode of Data Security over Coffee, Reclamere leaders Joe Harford and Angie Singer Keating are joined by Rich Servello, CAC Program Director at Family Services Altoona, for a thoughtful discussion on family, community, and cyber resilience. This episode explores how human…
Read More2025 SMB Threat Report: Key Takeaways For Regulated Industries
SMBs In The Crosshairs As 2025 Comes To A Close As 2025 draws to a close, one thing is clear. For small and medium businesses, this was not just another noisy year in cybersecurity. It became a turning point. The data from the past two years tells a consistent story. In 2024, 94% of small…
Read MoreCybersecurity Blind Spots: What Business SMB Leaders Often Miss
Every cyber leader understands the importance of strong security controls—but the biggest risks in 2026 often come from what you don’t see. Cyber attackers thrive on blind spots: missed patches, dormant accounts, misconfigured rules, shadow IT, or backups no one has tested. These gaps may seem small or routine, yet they account for a significant…
Read More