Is SMS Multifactor Authentication (MFA) Still Secure?
Is SMS-based MFA secure? Discover its vulnerabilities and explore stronger alternatives—like app-based MFA, hardware keys, and biometrics—with guidance from High Touch Technologies.
What Is a Man-in-the-Middle (MITM) Attack?
Protect your business from cyberthreats with this expert guide to Man-in-the-Middle (MITM) attacks. Learn how hackers intercept sensitive data, real-world attack examples, and 7 proven cybersecurity strategies to stay safe. Stay ahead of cybercriminals.
High Touch Celebrates Youth Leadership at Boys & Girls Clubs’ Youth of the Year Event
See how High Touch Technologies supports youth through our technology partnership with the Boys and Girls Clubs of South Central KS. Learn about our community engagement, managed IT services, and how we empower the next generation through technology-driven solutions.
Maximize Your IT Investment: How To Make the Most of Your Technology Budget
Maximize your IT budget with these expert strategies for optimizing technology spending. Learn how to avoid common pitfalls, prioritize high-ROI investments, and align IT with your business goals. Partner with an MSP or vCIO to streamline costs and boost efficiency.
High Touch’s 2024 In Review
Discover High Touch's 2024 milestones: MSP 500 recognition, Acumatica Gold Partner renewal, SOC 2 certification, and impactful community involvement.
Cybersecurity Tips: Safely Shopping on Black Friday and Cyber Monday
Ensure a secure shopping experience this Black Friday and Cyber Monday with our top 9 cybersecurity tips. Protect your data and shop confidently.
Employee Spotlight: Sydney Unruh
Get to know Sydney Unruh, High Touch's Training Specialist II, who helps our clients feel confident in using our Nigel restaurant point-of-sale system.
WBJ Young Professionals in Major Companies – Brett Werth
High Touch’s Brett Werth honored with WBJ’s Young Professionals Award for excellence. Learn about his achievements and impact on our team.
What Is Shadow IT?
Discover the hidden risks of shadow IT and how it exposes your business to security threats, data breaches, and compliance issues. Learn how to stay protected.
WBJ: Fenoglio Featured in 2024 Cybersecurity Table of Experts
Our Director of Information Security shares expert cybersecurity insights through the WBJ’s 2024 Cybersecurity Table of Experts. Learn about strategies, cyber insurance, AI risks, and more.
Understanding Microsoft SQL Server 2014 End of Support
Microsoft SQL Server 2014 reached EOS on July 9, 2024. Learn why upgrading or migrating is crucial and how High Touch can help.
Guide: Windows 10 End of Life
Learn why upgrading from Windows 10 before its end of life in 2025 is crucial for security. Get tips on transitioning to Windows 11 and keeping your business protected.





