
It is not your staff’s responsibility to understand all the specifics of most technologies. However, it is in your organization’s best interest to educate on how to access critical and highly sensitive information.
It is not your staff’s responsibility to understand all the specifics of most technologies. However, it is in your organization’s best interest to educate on how to access critical and highly sensitive information.
Simplify How Your Team Accesses your Apps with Security in Mind What is an Identity Access Management Tool? Identity & Access Management (AIM) is the security discipline that enables the right individuals to access the right resources at the right times for the right reasons. Another way to look at it is AIM is a… Read more »
Resistance to the Cloud Ain’t Cray I had a great conversation with one of our creative firms this week about protecting devices. Until recently, they were a little resistant to jump head first into the Cloud. To start the conversation, I made one thing very clear: this resistance is/ was completely reasonable. It’s understandable to… Read more »
How to educate your team and avoid embarrassment What is Phishing? Email Phishing is when someone pretends to be someone they’re not through a misleading email scam. For example, a common example would be a message seemingly from your CEO requesting you send her money via iTunes gift cards or a wire transfer. So what… Read more »
SD-WAT?! The short version: SD-WAN is a way to take cheaper commodity internet and make it viable for business critical applications (e.g. voice services, etc). What that means is you can run voice over the internet in a way that is essentially bulletproof. This is the same way that Multiprotocol Label Switching (MPLS; which is… Read more »
You’ve probably been hearing a lot about Meltdown and Spectre -and you’ll continue to over the next several weeks. These bugs affect most CPU manufacturers, including (to various degrees) Intel, AMD, ARM and now Qualcomm. To be clear, this impacts essentially every network on the planet. What Ripple has already done We’ve been keeping a… Read more »
You’ve probably seen or heard on the news of a serious vulnerability called KRACK. In short, this is a vulnerability that impacts most (if not all) routers. Without action, hackers within range of your Wi-Fi network could see your internet traffic and potentially infiltrate your network. YIKES! So what should I do? Whether you’ve got… Read more »
In today’s busy world, email is fundamental to communication. But what happens when something goes wrong and your security is compromised? Viruses, phishing scams, and information breaches are not uncommon and have high costs. Email security is something that can often slip to the wayside, but it’s not complicated to put measures in place to… Read more »
Recent Comments