Bitlocker and Solid State Drives To keep devices secure, many companies rely on a product from Microsoft called Bitlocker. Bitlocker […]
Bitlocker and Solid State Drives To keep devices secure, many companies rely on a product from Microsoft called Bitlocker. Bitlocker […]
What are B2B VPN Many companies need direct connectivity with other trusted organizations to do business. A cost-effective way to […]
In case you missed our webinar last week, Brian and I talked about security assessments and how they fit into […]
Ransomware is a type of malware that infects a computer and locks their files by encrypting them so they cannot […]
When discussing network security, firewalls are the number one item that comes up. That is because they often are a […]
When asked about security practices many organizations are quick to respond; “We do a security assessment every month [or quarter].” But what do you mean by security assessment? Often, this security assessment is a network or vulnerability scan performed by an automated appliance or service. This is not a security assessment.
Attackers who are trying to break into a system know that the weakest line of defense is often the people. To get to these people attackers use schemes such as phishing, spear phishing, whaling, and watering hole attacks. We will look at each of those attacks and tell you ways to protect yourself against them.
In 2017 the amount of cyber attacks had doubled from 2016, and 2018 is looking to be just as bad. Threats are always changing as attackers adapt to defeat modern security controls. Here are some modern threats that any business may face.
Give us a call or drop by anytime, we endeavour to answer all enquiries within 24 hours on business days.