Defense in Depth: The Secret to a Successful Security Strategy

For better or worse the digital transformation has changed the way we live and work. While the digital age has improved our productivity and connectedness, it has also opened up new avenues for attackers to steal from us, and spy on us. To combat modern-day threats like targeted ransomware and social engineering, we must look back to a defense strategy born in medieval times; the castle approach.

Read more

Antivirus Software & Endpoint Protection: How to Secure Your Network

It’s less likely that you will be infected with a simple computer virus in 2019. Today’s malware focuses on generating money for the hacker, and there isn’t much money to be made in spreading traditional computer viruses. The odds are that you will be hit with ransomware, trojans that steal your data, or a bot that lets a “bot-herder” rent out bits of your computing power to be used for insidious acts. 

Read more

Intrusion Prevention System (IPS) vs Intrusion Detection System (IDS)

A firewall is often overlooked when thinking about your normal business operations, but that little box handles many critical processes, especially at the perimeter of your organization.

Read more

Firewalls 101: What They Are & How They Work

Traditional firewalls block incoming traffic based on the kind of traffic it is. Firewalls have been the first line of defense in network security for nearly three decades.  They can come in many different types including traditional, next-generation, hardware, or software. With thirty years of technology changes and so many different firewall forms, it can be difficult to determine your firewall needs. Choosing the wrong firewall can leave you vulnerable to the emerging threats of today’s threat landscape.

Read more

Email Security Best Practices: Solutions to Secure Your Inbox

Email has made workplace communication efficient and convenient for everyone. While this has boosted the productivity of workers, it has also made hackers jobs easier.

Read more

Patching Vulnerabilities: Your Guide to Patch Management

Over sixty percent of small businesses fall victim to hacking each year, and unpatched software is the leading cause of computers getting exploited.

Patch management is an integral part of network security as it protects your operating system and applications from malicious attacks that exploit vulnerabilities in unpatched software.

Read more