by Katherine Parker | Aug 5, 2020 | Endpoint Security, Network Security, Network Visibility, Remote Access, Uncategorized
If the pandemic has caused your office to adopt a Work-From-Home (WFH) configuration, and if this configuration is one that you intend to keep moving forward, Endpoint Protection is an important part of network security. Endpoint Protection is often thought of as...
by Katherine Parker | Mar 20, 2020 | Data Security, DNS Filtering, Intrusion Prevention, Network Security, Network Visibility, Uncategorized
We find that security gaps are typically found in these six common places in the network. If you investigate these six areas of your network, you are likely to be able to find and fix the biggest offenders when it comes to your security. Review these common culprits,...
by Katherine Parker | Feb 21, 2020 | Data Security, Hacker Prevention, Intrusion Prevention, Malware, Network Security, Network Visibility, Role-based Access Control (RBAC)
“Why us?” This is the common question we hear every time we arrive on the scene to mitigate a network crippled by either a malware that made it into a system, or a hacker who snuck in to do a smash and grab. The answer is, as we have discussed before, that criminals...
by Katherine Parker | Feb 14, 2020 | Data Security, Email Environment Security, General Information, Hacker Prevention, Incident Response Plan, Intrusion Prevention, Malware, Malware Incident Response, MSSP, Network Security, Network Visibility, Secure Data Storage, Uncategorized
For many companies, the need for a tightly secure business network is high, but the budget for making a secure network happen is low. Often times business owners and upper management have to make hard decisions about who they hire to manage these decisions. Seasoned...
by Katherine Parker | Jan 17, 2020 | Cloud Computing, Cyberattack, Data Security, Email Environment Security, Hacker Prevention, Intrusion Prevention, Network Security, Network Visibility, Uncategorized
“Assumptions are the enemy of security,” Secure Networkers CTO Todd Ellis observes. A network without complete visibility runs the risk of unknown security gaps. Companies who have not executed thorough network gap analysis leads to companies assuming their networks...
by Katherine Parker | Nov 15, 2019 | Data Breach Response, General Information, Network Security, Network Visibility, Uncategorized
It is always after the security breach happens when a businesses learns that their firewall and anti-virus solution had an unprotected flaw – the flaw that became an adversary’s attack vector. Can you ever have confidence in network security and protection...
Recent Comments