Introducing the New ControlOne “Agent” Software, from Total Digital Security

As we step into 2024, it’s time to embrace new beginnings and heightened security for our digital lives. We are pleased to introduce the new ControlOne “agent” software, our...

Unraveling Artificial Intelligence: Evolution, Practical Adoption and Risks- Webinar Recording

The Artificial Intelligence (AI) story is just beginning. The Colony Group and Total Digital Security connect for an in-depth discussion designed to demystify AI, highlight foundational concepts, and explore...

Ensuring a Successful Family Legacy

The goal of this paper is to help you structure a successful and enduring legacy.  Ensuring a Successful Family Legacy will frame the issues around your legacy, enable you...

2023 Curated by Colony Security Webinar Series: (Session 2) Identity Theft – Protecting your Personal Information

Curated by Colony security provider Regal Credit Management as we discuss the prevalence and challenges of identity theft. Learn best practices to protect yourself, how to spot an attack,...

Legacy Series: Threshold Questions For Familes

The goal of this paper is to help you get structured for investment success. This requires asking the right questions and prioritizing your objectives. Threshold Questions will help you...

2023 Curated by Colony Security Webinar Series: Cybersecurity – Protect your Devices, Email, Networks and Information in Real Time

In part one of this two-part webinar series, Curated by Colony security provider Total Digital Security discusses current challenges and trends in digital risk management. Learn best practices to...

Legacy Series: Thoughts On Philanthropy

At the Colony Group, our mission is to deliver peace of mind to our clients and to empower their visions of tomorrow. A component of how we achieve our...

Attack Surface #3: Home Internet Routers and Wi-Fi Systems – Manage Your Network Security and Privacy

Our third and final workshop, Manage Your Network Security and Privacy, provided insightful tips and best practices to help protect your home internet routers and Wi-Fi systems from cyberattacks. “Most routers...

Attack Surface #2: Devices – How to Protect Your Phone, Tablets, and Computer

Our second workshop, How to Protect Your Phone, Tablets, and Computer, provided insightful tips and best practices to help protect your personal devices from cyberattacks. “It’s about protecting our personal information...

Attack Surface #1: Email – How to Privatize and Secure Your Email

Our first workshop, How to Privatize and Secure Your Email, provided best practices and actionable takeaways to help protect your email and increase digital privacy and security. “The greatest threats consistently...