This experience solidified her belief that she could figure out anything, and that confidence propelled her into a successful 25+ year career at the intersection of technology and marketing.
In her career, Susanna was naturally drawn to marketing, however she also had a passion for product development. She worked for household names like Moen and Stanley Tools, where she was part of teams that developed and patented innovative products. Notably, she was the first non-chemist to hold a marketing role at Rogers, Inc., a specialty foam manufacturer.
She leveraged her technical skills to land a marketing communications job at a small business. She then parlayed that experience into a role at a tech recruiting and coaching firm, where she built out their digital marketing presence and interviewed candidates for tech positions. Her candidates taught her about multi-threading and the tricks associated with C#.
Susanna's ability to understand both the technical aspects of products and the needs of customers has made her a skilled content creator. She can take complex technical topics and make them easy to understand for a general audience.
Connect with Susanna on LinkedIN.
Ransomware continues to be one of the most pervasive and destructive cyber threats facing organizations globally.
RansomHub, a significant and rapidly growing ransomware-as-a-service (RaaS) operation has quickly made its mark since its inception in early 2024.
LockBit gains unauthorized access by exploiting vulnerabilities, leveraging compromised entry points.
Ransomware continues to be one of the most pervasive and destructive cyber threats facing organizations globally.
RansomHub, a significant and rapidly growing ransomware-as-a-service (RaaS) operation has quickly made its mark since its inception in early 2024.
LockBit gains unauthorized access by exploiting vulnerabilities, leveraging compromised entry points.
Cyber threats have become more pervasive and damaging as law firms climb the target list.
Ryuk is a sophisticated strand of ransomware that not only encrypts network drives, but it also deletes shadow copies on the endpoint. Here's how to prevent it!
In today's digital battleground, cyberattacks are not a matter of if but when.
The once-standard protection of having good backups is being undermined, as these backups are increasingly falling victim to corruption.
Social engineering lies at the root of roughly 98% of IT security attacks. Discover how to identify the most common tactics.
The hum of anticipation filled the offices of Synergy Solutions, a growing professional services firm.
Discover the benefits to IT services when you merge two key roles: Virtual Chief Information Officer (vCIO) and Customer Success Manager (CSM).
Social engineering is one of the many cyberthreat tactics that put businesses at risk for substantial harm. Learn more about how to protect your business.
How organizations can develop comprehensive risk mitigation strategies that effectively reduce their exposure to potential threats.
If your support issue requires immediate assistance, please call our office. Email & web form submissions are only reviewed during business hours.