As the intelligence of hackers continues to grow, so does the technology built to protect against even their best attacks. Technology like Endpoint Detection & Response (EDR) can be invaluable to businesses or managed service providers (MSPs), but with such a powerful ...
Understanding cybersecurity can be complex in today's constantly-evolving threat landscape. With every new advancement in technology comes a new opportunity for hackers, a new avenue for attack, and a new vulnerability to be exploited.
Cybercriminals are incredibly resourceful. As security practices rise in sophistication to account for rapidly diversifying types of threats, hackers are returning to not-so-new methods to sidestep modern security practices.
Moving your business into a new office space is often both an exciting and stressful transition. Some surprises and setbacks may be unavoidable, but strong planning beforehand can help you avoid major missteps.
We’ve all been there before. You’ve spent hours working hard on a PowerPoint presentation and you’re just about to finish it up when, suddenly, the application crashes.
To be competitive in today’s digital world, SMBs must increase their web footprint year-after-year. Unfortunately, the only digital element that hasn’t increased at the same rate is cybersecurity awareness. For leaders and decision-makers at the top of an organization, ...
It’s not just big businesses that are at risk of being hacked or cyber-attacked. It may seem scary to let your kids go online after you hear that, but don’t throw all the computers away and live off-the-grid just yet. Try implementing these five cybersecurity practices in ...
Over the last 2 years, our team has been researching a number of platforms, frameworks, trainings, and various definitions of Endpoint Detection & Response (EDR) technology. And of course, the newest hot buzzword in cybersecurity: “Threat Hunting.” After all this ...
It’s true, some of the smallest improvements can really be game changers — especially in cybersecurity. Whether you know it or not, cyber criminals see you—the end user—as an easy target. But don’t worry, you don’t need the newest security technology to protect yourself ...
We all know that security is hard… for an MSP, it’s even more difficult. In addition to balancing the everyday security risks that every business faces, MSP’s also have to focus on their customers’ networks. A lot of times, the security of customer networks take precedence ...
Sometimes, it's the little things that make a big difference. This is especially true for cybersecurity. Here are 10 common mistakes made in office settings that leave people vulnerable to cyber attacks, presented by Security Engineer, Will Tipton:
You know how the story goes... Two guys are out hiking in the forest when they notice that a bear begins charging at them. One of the guys pulls off his heavy hiking boots and begins tying on a pair of running shoes.
You may have heard the statistic: 90% of breaches start with email. But you’re probably thinking, that won’t happen to me. You know the signs of a phishing email and you avoid emails that are clearly unsafe, so you’re not going to be the one who gets breached, right?
One of the latest phishing scams affecting small businesses is a message that alleges “your email account and device been hacked” and that “we have installed one RAT software into your device.”
Ignore security at your own and your customers’ peril. Recently there was a post on r/sysadmin from a network administrator who had a client system hacked because he left their iLO card facing the internet…