Alpine Cyber Blog

What is Cybersecurity?

By Cybersecurity

As part of National Cybersecurity Awareness Month, we’re kicking off a new video blog series! These vlogs will highlight different cybersecurity tips and tricks to help you #BeCyberSmart and show you how to protect yourself and your company from cyber-attacks. In addition to this new series, we’re celebrating National Cybersecurity Awareness Month across our website and social media by sharing tips, tricks, facts, and steps you can take. In part 1 of our video series, we’re exploring “What is Cybersecurity” and we walk you through the CIA Triad to show you how you can be cyber smart by focusing on Confidentiality,…

Read More

The Impact of Working Remotely on Endpoint Security Management

By Cybersecurity

In our last blog post, we introduced, defined, and explained Endpoint Security Management and why your company should have endpoint protection in place. In part two of this series, we explore how and why the shift to working remotely is changing the IT and cybersecurity landscape and increasing the need for endpoint security tools. Working Remotely Has Changed the Technology Game It’s not a stretch to say that the sudden shift to working from home in 2020 thanks to COVID-19 caught a lot of people and companies by surprise. In an instant, everything changed with new policies, procedures, and, in…

Read More

What is Endpoint Security Management?

By Cybersecurity

What is Endpoint Security?   You’re probably familiar with terms like “ransomware”, “malware”, “phishing”, and “data breaches” and (hopefully) have tools in place to help prevent those cybersecurity attacks. But, what about Endpoint Security? If that term is new to you, it’s ok; I’m here to help you understand what it is and why Endpoint Security Management is a crucial component of your company’s security posture. Endpoint management is the process of ensuring that anything (including servers, desktops, laptops, tablets and smartphones) that’s used to access your company’s network is secured, monitored, and managed. Or, in simpler terms, it’s making…

Read More

Put It In the Cloud. It’s Safer There.

By Cloud Computing, Cybersecurity

Times Have Changed – For the Better It wasn’t long ago – maybe 10 years – that the headline of this article would have blown my mind.  And I’d probably have dismissed this whole blog post as ridiculous propaganda.  But times have changed. If you’re still a cloud naysayer, even after all this time, I don’t expect this little post to fully change your mind.  But maybe it can put a chip in your preconceptions. And I’m not going deep here.  If you want to talk more, question my assumptions, or even rage from your rooftop, please feel free to…

Read More

3 Steps to Professional Vulnerability Management

By Cybersecurity

The IT Department Dream Scenario Imagine your CIO has the following information at his or her fingertips: Exactly how many machines are in their environment All the vulnerabilities for each device All the available patches A list of priorities to show which issues are most critical And what else could complete this dream scenario? For any patch that isn’t available or installable, the team has a mitigation plan to address it. Are you already living the dream? Or did you just realize your vulnerability management isn’t up to snuff? Keep reading and we’ll explain how CIOs can sleep easier at…

Read More