by Katherine Parker | Feb 14, 2020 | Data Security, Email Environment Security, General Information, Hacker Prevention, Incident Response Plan, Intrusion Prevention, Malware, Malware Incident Response, MSSP, Network Security, Network Visibility, Secure Data Storage, Uncategorized
For many companies, the need for a tightly secure business network is high, but the budget for making a secure network happen is low. Often times business owners and upper management have to make hard decisions about who they hire to manage these decisions. Seasoned...
by Katherine Parker | Jan 30, 2020 | Cyberattack, Data Breach Response, Incident Response Plan, MSSP, Network Remediation, Network Security, Uncategorized
In this IT News Brief: Are you ready? A Cyberattack or databreach is very likely to hit your business. Will it hit you hard, or have you prepared for it? The path of preparation is daunting, but there are things to make it easier. We discuss. Meet Miguel Espinosa, one...
by Katherine Parker | Nov 15, 2019 | Data Breach Response, General Information, Network Security, Network Visibility, Uncategorized
It is always after the security breach happens when a businesses learns that their firewall and anti-virus solution had an unprotected flaw – the flaw that became an adversary’s attack vector. Can you ever have confidence in network security and protection...
by Katherine Parker | Nov 1, 2019 | Data Breach Response, General Information, Network Remediation, Uncategorized
IT News Brief November 2019: We are seeing large numbers of our clients falling prey to both phishing and whaling. Both types of fraud are aimed at get information and/or money from the victims. Unfortunately, not only are these becoming more common but the criminals...
by Katherine Parker | Jul 31, 2019 | Malware, Malware Incident Response, Rootkit, Uncategorized
Rootkits may use any of a number of techniques to gain control of a system. We touched on this in “Man Behind the Curtain” introduction to Rootkit Malware, that rootkits come in different makes and models, and the type of rootkit will determine the choice of attack...
by Katherine Parker | Jun 14, 2019 | Cloud Computing, Data Protection Laws, General Information, Secure Data Storage, Uncategorized
Transitioning a business network to the cloud is a smart move for most businesses. If it is possible to manage your network and data off-premesis, it is usually advisable because: It decreases the need to manage and maintain hardware It decreases the risk of employee...
Recent Comments