by Katherine Parker | Jul 8, 2020 | Data Security, Device Security, Email Environment Security, Hacker Prevention, Intrusion Prevention, Mobile Devices, Password Security, Uncategorized
If the pandemic has caused your office to adopt a Work-From-Home (WFH) configuration, and if this configuration is one that you intend to keep moving forward, there are some critical steps your business should take to make sure that you manage your new remote...
by Katherine Parker | Mar 20, 2020 | Data Security, DNS Filtering, Intrusion Prevention, Network Security, Network Visibility, Uncategorized
We find that security gaps are typically found in these six common places in the network. If you investigate these six areas of your network, you are likely to be able to find and fix the biggest offenders when it comes to your security. Review these common culprits,...
by Katherine Parker | Feb 21, 2020 | Data Security, Hacker Prevention, Intrusion Prevention, Malware, Network Security, Network Visibility, Role-based Access Control (RBAC)
“Why us?” This is the common question we hear every time we arrive on the scene to mitigate a network crippled by either a malware that made it into a system, or a hacker who snuck in to do a smash and grab. The answer is, as we have discussed before, that criminals...
by Katherine Parker | Feb 14, 2020 | Data Security, Email Environment Security, General Information, Hacker Prevention, Incident Response Plan, Intrusion Prevention, Malware, Malware Incident Response, MSSP, Network Security, Network Visibility, Secure Data Storage, Uncategorized
For many companies, the need for a tightly secure business network is high, but the budget for making a secure network happen is low. Often times business owners and upper management have to make hard decisions about who they hire to manage these decisions. Seasoned...
by Katherine Parker | Jan 17, 2020 | Cloud Computing, Cyberattack, Data Security, Email Environment Security, Hacker Prevention, Intrusion Prevention, Network Security, Network Visibility, Uncategorized
“Assumptions are the enemy of security,” Secure Networkers CTO Todd Ellis observes. A network without complete visibility runs the risk of unknown security gaps. Companies who have not executed thorough network gap analysis leads to companies assuming their networks...
by Katherine Parker | Jan 8, 2020 | Cyberattack, Data Security, Device Security, Email Environment Security, Hacker Prevention, Incident Response Plan, Intrusion Prevention, Network Security, Secure Data Storage, Uncategorized
Texas governor Greg Abbott provided a formal address yesterday (January 7, 2020) regarding the state of affairs with Texas cybersecurity. Our own Texas DIR has been monitoring cyber activity across Texas, and has found up to 10,000 attempted attacks per minute from...