All Posts By

Jeremy Wheeler

Endpoint Security Tools and Tips

By Cybersecurity

Endpoints are one of the easiest ways for cyber attackers to access your systems and network, especially now with so many teams working remotely. So, what can you do to manage your endpoint security and keep the bad guys out? In our latest video, Jeremy provides tools and tips that you can implement today to secure your endpoints and protect your corporate systems and devices. Contact Us to learn more about how we can be your cybersecurity partner.

Read More

Security vs. Convenience

By Cybersecurity

What’s better, security or convenience? The truth is, you don’t want to sacrifice one for the other. Discover why you need to find the balance between security and convenience when it comes to your cybersecurity. Contact Us to learn more about how we can be your cybersecurity partner.

Read More

How The Grinch Stole… Your Information – Part 1

By Cybersecurity

We’ll start out by stating the obvious: Thieves stink. Nobody likes to get robbed. More so, nobody likes to admit that they didn’t prevent thieves from entering their house and taking their stuff. So generally speaking, it is always a good idea to lock your house’s windows and doors. Apply that same mindset to your home network. When most people think of their network, they focus on their laptop and desktop computers. But in this day and age, networks are much broader! Your network is comprised of your computers, phones, home automation components, smart TVs, smart appliances, and more. Each of…

Read More

Compliant Doesn’t Always Mean Secure

By Cybersecurity No Comments

“We need to be compliant so we can pass an audit!” This phrase makes us shudder. Forget being compliant because it is the right thing to do – or because it more times than not leads you down a path to better configuration management or stronger business processes. Many organizations view compliance as an obstacle they must overcome.  It impacts numerous business areas, and cybersecurity is no exception. From NERC-CIP to NIST to SOC 2, organizations scramble to make sure their policies and technologies meet these different standards. Whether they do this because it’s right or because it’s required is only a…

Read More

Home Network Segmentation – How deep does/should the rabbit hole go?

By Cybersecurity 2 Comments

Sometimes it is really nice being a tech geek. I have been obsessing, recently, about something that probably 99% of homeowners don’t even consider – the physical and logical design of my home network. Businesses consider network design all the time.  They consider the repercussions of cat5, coax and fiber.  They segment subnets and VLANs for various reasons. But as a tech geek, I have to bring my work home. Lately, though, I’ve been forcing myself to face a hard question — “at what point do I say, ‘that’s good enough.’?” A few weeks ago, the Security Now podcast covered a segment called…

Read More