Posts Categorized: Security

Password Management (Understanding the value of Identity and Access Management with OneLogin)

It simplifies the experience for your team to access the tools they need to use in order to get their work done while making it just as easy for your IT administrators to manage. 

Simplify How Your Team Accesses your Apps with Security in Mind What is an Identity Access Management Tool?

 Identity & Access Management (AIM) is the security discipline that enables the right individuals to access the right resources at the right times for the right reasons. Another way to look at it is AIM is a… Read more »

5 Simple and (almost) Free Ways to Protect your Business Data

two-factor authentication

Resistance to the Cloud Ain’t Cray I had a great conversation with one of our creative firms this week about protecting devices. Until recently, they were a little resistant to jump head first into the Cloud. To start the conversation, I made one thing very clear: this resistance is/ was completely reasonable. It’s understandable to… Read more »

Gone Phishing

How to educate your team and avoid embarrassment What is Phishing?

 Email Phishing is when someone pretends to be someone they’re not through a misleading email scam. For example, a common example would be a message seemingly from your CEO requesting you send her money via iTunes gift cards or a wire transfer.
 So what… Read more »

How SD-WAN Makes Cheap Internet Faster, Safer, and more Cost-Effective

SD-WAT?! The short version: SD-WAN is a way to take cheaper commodity internet and make it viable for business critical applications (e.g. voice services, etc). What that means is you can run voice over the internet in a way that is essentially bulletproof. This is the same way that Multiprotocol Label Switching (MPLS; which is… Read more »

What is Meltdown & Spectre and what should you do?

You’ve probably been hearing a lot about Meltdown and Spectre -and you’ll continue to over the next several weeks. These bugs affect most CPU manufacturers, including (to various degrees) Intel, AMD, ARM and now Qualcomm. To be clear, this impacts essentially every network on the planet. What Ripple has already done We’ve been keeping a… Read more »

Just say no to KRACK!

You’ve probably seen or heard on the news of a serious vulnerability called KRACK. In short, this is a vulnerability that impacts most (if not all) routers. Without action, hackers within range of your Wi-Fi network could see your internet traffic and potentially infiltrate your network. YIKES! So what should I do? Whether you’ve got… Read more »

Keep Your Email Secure: Best Practices Cheat Sheet

  In today’s busy world, email is fundamental to communication. But what happens when something goes wrong and your security is compromised? Viruses, phishing scams, and information breaches are not uncommon and have high costs. Email security is something that can often slip to the wayside, but it’s not complicated to put measures in place to… Read more »