<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">
Skip to main content

Blog

Blog Category // Cybersecurity (6)

The Complete Guide to EDR

As the intelligence of hackers continues to grow, so does the technology built to protect against even their best attacks. Technology like Endpoint Detection & Response (EDR) can be invaluable to businesses or managed service providers (MSPs), but with such a powerful ...

Threats Hiding in Plain Sight: Digital Steganography on the Rise

Cybercriminals are incredibly resourceful. As security practices rise in sophistication to account for rapidly diversifying types of threats, hackers are returning to not-so-new methods to sidestep modern security practices.

4 Questions Every CEO Should Ask About Cybersecurity

To be competitive in today’s digital world, SMBs must increase their web footprint year-after-year. Unfortunately, the only digital element that hasn’t increased at the same rate is cybersecurity awareness. For leaders and decision-makers at the top of an organization, ...

A Security Engineer's Guide to EDR

Over the last 2 years, our team has been researching a number of platforms, frameworks, trainings, and various definitions of Endpoint Detection & Response (EDR) technology. And of course, the newest hot buzzword in cybersecurity: “Threat Hunting.” After all this ...

10 Mistakes that Will Get You Hacked

Sometimes, it's the little things that make a big difference. This is especially true for cybersecurity. Here are 10 common mistakes made in office settings that leave people vulnerable to cyber attacks, presented by Security Engineer, Will Tipton:

Spear Phishing: Be the Harder Target

You know how the story goes... Two guys are out hiking in the forest when they notice that a bear begins charging at them. One of the guys pulls off his heavy hiking boots and begins tying on a pair of running shoes.

“You have 48 hours after reading this letter” – How to Identify the Latest Phishing Scam

One of the latest phishing scams affecting small businesses is a message that alleges “your email account and device been hacked” and that “we have installed one RAT software into your device.”

Vulnerability Management: Don’t Be That Guy

Ignore security at your own and your customers’ peril. Recently there was a post on r/sysadmin from a network administrator who had a client system hacked because he left their iLO card facing the internet…

IoT and UPnP: A Dangerous Combination

Over the past 15 years, Internet of Thing (IoT) devices have radically changed the IT world, introducing many benefits along with some tricky downsides. For example, while vulnerabilities found within IoT devices have been common knowledge since 2006, the rapid development ...

Does Your Business Have an Incident Response Plan?

Your business experiences a data breach. What happens next?

Don’t Get Hooked! 7 Signs of a Phishing Email

You may not realize it, but your computer, mobile devices, accounts, and information all have value to cyber criminals. According to Verizon’s Data Breach Report, 91% of company breaches start with an email. Knowing how to maintain email security at the user level will keep ...

How to Reduce Security Risks Created by Your Employees

How often does the average person think about cybersecurity?

What Do You Have That Cyber Criminals Want?

You may not realize it, but you, your company, and your employees are all targets for cyber criminals. Computers, mobile devices, accounts and your information all have tremendous value.

Traditional vs Advanced Malware Prevention

Think of the last time you purchased a brand new car. What if it didn’t work after only one day? You jump in your shiny new ride, fasten your seat belt and turn the ignition, and … nothing. The car won’t start.

Vulnerability Scanning Authentication

Vulnerability scans are a great way to dive deeper into a network and search for problems that may go otherwise undetected. Many times, however, security professionals are performing scans that are only scratching the surface of what could potentially be uncovered.