
Fostering a Culture of Sharing
Part of what makes ZAG special is sharing learned experiences to better serve our clients. Here’s how we do …

The Next Big Target for Cyberattack: Agriculture and the Supply Chain
In this article that appears in Security Technology, ZAG President Greg Gatzke explains the cybersecurity risks to …

The Ins and Outs of Cloud Migration: 5 Factors to Consider
ZAG outlines five factors to consider when you’re considering shifting to a public cloud services provider like …

What Does Technology as a Competitive Advantage Mean?
ZAG talks a lot about competitive advantage from technology investments. But what does this mean really? We address it …

Western Grower & Shipper: 6 Ways to Strengthen the Supply Chain
ZAG appeared in the July/August 2021 issue of Western Grower & Shipper Magazine to discuss supply chain security. …

8 Things You Can Do Today to Protect Yourself From Cybercrime
ZAG outlines how you can protect yourself and your organization today from the detrimental effects of …

A Spinach Story: How the Supply Chain Affects its Journey from Farm to Table
In this infographic, ZAG follows the journey of a shipment of spinach from farm to table, pointing out potential …

Guest Post: Why MSPs Like ZAG Matter in the Food Supply Chain
As a true MSP partner, Latitude 36 Foods looks to ZAG to help boost its technology defenses against potential …

“Tech Debt” + What It Means for Your Business
Technical debt can cost your business when not proactively addressed. Here’s why this should be a part of your next …

ZAG Selected by N-able as a Super Elite Partner
ZAG is now a Super Elite partner with N-able (formerly SolarWinds MSP), the global leader in remote network and systems …

ZAG Achieves Blue Diamond Partner Status with Datto
ZAG has achieved exclusive Blue Diamond partner status with Datto, the leading global provider of cloud-based …

How the White House Open Letter on Ransomware Could Impact the Ag Industry
Thoughts about the recent White House letter to the private sector about cybersecurity best practices and the need to …

Multi-factor Authentication: 5 Facts to Know
Multi-factor authentication should be part of a multi-layered approach to protecting your organization. Here’s how it …

Incident Response Planning: What You Need to Know
Incident response planning should be an integral part of protecting your company from an attack or breach. Here’s …

PII: Why Your Organization Should Care
Personally identifiable information, or PII, should be protected. But what should organizations do to ensure that it …

What the Ag Industry Can Learn from the Colonial Pipeline Hack
The Colonial Pipeline hack was a reminder that the supply chain is at risk. Here’s what the agriculture industry can …

The One Thing – Cisco Duo MFA Lunch ‘n Learn
Multi-Factor Authentication is a simple, effective way to improve your security posture. Learn how in this lunch 'n …
![[INFOGRAPHIC]: Where is the Supply Chain Risk?](https://www.zagtech.com/wp-content/uploads/2021/05/AdobeStock_423857025-scaled-470x298.jpeg)
[INFOGRAPHIC]: Where is the Supply Chain Risk?
Each stage of the supply chain uses technology to help products get to where they need to go, but introducing tech …

ZAG Launches Supply Chain Risk Program to Address Vendor Cyber Vulnerabilities
ZAG launches a new supply chain risk assessment and management program aimed at providing agribusinesses with …

How to Create a Firewall: Best Practices for Protecting Internal Networks
Creating a firewall can help protect your network from unauthorized access. ZAG provides best practices for …