Tony DeGonia

Consultant - Cyber Security, Cloud Services, Physical Security

Highly proficient, knowledgeable and motivated Sales Engineer with a successful track record of sales success across 2 decades. Motivated professional who excels at delivering quality service while exceeding revenue benchmarks on a consistent basis. Well versed in multiple security domains including, cyber, cloud, networking and physical (IP/CCTV). Equally comfortable installing and deploying cutting edge technology, negotiating sales contracts from SMB to Large Enterprise or speaking/training on an advanced technology subjects to an audience of 400 or more. I am available for immediate employment either via W2 or 1099. If you are a client and would like to contract my services as a consultant please contact me via email or telephone and we can discuss the issues and my rates at that time. Thank you for visiting my website.

Cyber Security Proficiency


Cloud Services Proficiency


Networking Proficiency


Physical Security Proficiency


Bible verse of the day

But since sexual immorality is occurring, each man should have sexual relations with his own wife, and each woman with her own husband.


You are not logged in.
Wills Point, TX
clear sky
humidity: 67%
wind: 6mph N
H 52 • L 51
Weather from OpenWeatherMap


I write and curate articles for this site that I think may be helpful, educational and even some that are original works. I am also a published author of a number of articles on different technology subjects, not just through my own website but through nationally known channels as well. I have also been quoted for numerous articles as a subject matter expert in the fields of Managed Services and Cloud Services.

Search our Articles

Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages

Top Security Threat #5 – Network Blind Spots

See Threats Before It’s Too Late In an increasingly unpredictable threat environment, security breaches are becoming harder and harder to detect. Malware, backdoors, and data loss routinely go unnoticed for (more…)

Top Security Threat #3 – Ransomware

Don’t Be the Next Victim of Ransomware Ransomware is an increasingly common method of attack for hackers against individuals, SMBs and enterprises alike. While the first incidents of ransomware were (more…)

Top Security Threat #2 – Data Loss

Protect Your Most Sensitive Asset from Compromise Data is the life blood of your business. You can replace computers, re-install software and repair networks, but recovering from a major data (more…)

Top Security Threat #1 – Advanced Malware

Survive the Epidemic of Advanced Evasive Malware Whether as old-fashioned virus attachments in email, trojans delivered through network attacks, or modern ransomware forced through drive-by download web attacks, malware has (more…)

Understanding IPv4 Subnetting (Part 2)

by Rik Farrow and Scott Pinzon, with updates by Corey Nachreiner [Editor’s note: This article continues our attempt to explain the complex subject of subnetting in terms you can understand (more…)

Understanding IPv4 Subnetting (Part 1)

by Rik Farrow, updates by Corey Nachreiner [Editor’s note: If the difference between a bit and a byte stumps you, or if the term “IP addressing” seems foggy to you, you’ll (more…)

What Is a Port? (and Why Should I Block It?)

by Scott Pinzon, updates by Corey Nachreiner When used in construction or engineering, the term “firewall” means what it seems to mean: a wall capable of withstanding fire. It evokes (more…)

Understanding IP Addresses and Binary

by Corey Nachreiner, CISSP, Director of Security Strategy and Research Anyone who’s used a networked computer probably has a functional understanding of Internet Protocol addresses (referred to as IP for (more…)

Internet Protocol (IP) for Beginners

The Internet Protocol (the IP in TCP/IP) makes the Internet possible. IP also makes it possible for attackers anywhere in the world to attempt to break into your systems and (more…)

TCP/IP Ports and Protocols

The port numbers in the range from 0 to 1023 are the well-known ports or system ports.[6] They are used by system processes that provide widely used types of network (more…)

US government ‘hacked global bank system’

Dave Lee – North America technology reporter – April 15, 2017 A huge range of security weaknesses, said to be worth over $2m if sold on the black market, have been leaked (more…)

Member of The Internet Defense League

Member Infragard North Texas

Subscribe to Our Newsletter

Subscribe to our newsletter and join 14 other subscribers. Get all the latest content: Blog Posts, Podcasts, Training Videos and more all written or curated by Tony DeGonia.

Social Media