It’s the new year! Time to break out the old pad and paper for some new years resolutions. If one of your company goals this year is to improve your security posture (a worthy goal for any organization), here are three smaller resolutions you can keep to help you do just that: If you don’t already, use two factor or multi-factor authentication (TFA or MFA) instead of just a password for restricted access. The benefits of multi/two-factor authentication can’t be …

As Black Friday, Cyber Monday and all those great deals come barreling down upon us (or are already here in the case of some retailers), now is a prudent time to remember how to shop online safely. The holiday season is unfortunately a prime time for phishing emails, spoofed sites and other scams, so we thought we’d quickly review some tips to help you stay safe this holiday season. This post is an excerpt from our post last year–6 Ways …

When you think of a security threat, what comes to mind? A ransomware attack? A thief drilling into your vault and stealing your money? An unpatched vulnerability that could expose sensitive data? While all of these threats represent external forces, it’s just as important to remember your internal threats, too. In this post, we’ll discuss a few ways you can stay on top of insider threats to your organization’s data and reputation and take appropriate steps to protect your employees–not …

Now that we’ve had half a year to process the Spectre and Meltdown flaws released in January, what’s been done about it? Are we now “safe” or are there other CPU flaws out there that we just don’t know about? Unfortunately, there’s always the risk of as-yet unknown vulnerabilities that could be exploited for malicious purposes. But in the meantime, security researchers and other organizations are working hard on fixes to make the Internet (and in this case, computer architecture itself) …

Whether you use a PC or a Mac, if you are like me, you must rely on Windows Explorer or the Mac Finder to visualize and search your files and data as they are stored on your computer. These tools provide a user-friendly and intuitive way to manage all types of files and documents. They allow you to create new ones, move existing ones around, delete some, rename some, search their content, view metadata describing them, or even open and …

The European General Data Protection Regulation (GDPR) will be enforced starting May 25th, 2018. That’s only 10 weeks away! Are you still scrambling to become compliant? You’re not alone. According to a survey by Solix Technologies, 22 percent of companies were still unaware they had to comply with GDPR as recently as December. The general consensus is that half of all US companies that should be compliant with GDPR by May 25 will not be. Do you need to meet …

Managing customer and employee information properly can be a daunting task for any organization, and determining whether that information should be kept on-premise or in the cloud even more so. Active Directory (AD) is one identity management tool that can help businesses in this respect. AD has had some big changes since its early inception, which we’ll talk about in this post. In the olden days of Microsoft Windows Server AD, you had a simple on-premise repository that stored a …

Two factor authentication is widely recommended as a security practice to give an extra layer of protection to your network and personal accounts, but according to security researchers, if you use SMS texts as your second form of authentication, they could be subject to interception and exploitation. Security researchers demonstrated how easily they were able to manipulate the two-factor set up on a Bitcoin wallet account, simply by intercepting the text message sent over the cellular network. Once they reset …

Cybersecurity journalist Brian Krebs noted on his website the security and simplicity of adding a vocal password to your authentication process when you call a company such as a bank or investment firm to obtain access about your account. Voice passwords are a great idea. They can be a very effective security measure if a hacker calls your bank to open a fraudulent account in your name or requests a large transfer out of your account. Most banks require only your …

Setting budgets has become a key weapon in the ongoing struggle of organizations to understand and control their cloud spend. Public cloud providers have responded by offering their users services such as budget alerts and server tagging. Users, however, still struggle to see the costs associated with the resources they’ve tagged. In this post, we’ll talk about the challenge of viewing your costs in Azure and how you can solve it. Azure offers a few different methods of grouping services: …

Get started now. Exceptional service awaits.

Live Chat