Skip to main content
Category

Cybersecurity

The Impact of Working Remotely on Endpoint Security Management

By Cybersecurity

In our last blog post, we introduced, defined, and explained Endpoint Security Management and why your company should have endpoint protection in place. In part two of this series, we explore how and why the shift to working remotely is changing the IT and cybersecurity landscape and increasing the need for endpoint security tools. Working Remotely Has Changed the Technology Game It’s not a stretch to say that the sudden shift to working from home in 2020 thanks to COVID-19 caught a lot of people and companies by surprise. In an instant, everything changed with new policies, procedures, and, in…

Read More

What is Endpoint Security Management?

By Cybersecurity
What is Endpoint Security?   You’re probably familiar with terms like “ransomware”, “malware”, “phishing”, and “data breaches” and (hopefully) have tools in place to help prevent those cybersecurity attacks. But, what about Endpoint Security? If that term is new to you, it’s ok; I’m here to help you understand what it is and why Endpoint Security Management is a crucial component of your company’s security posture. Endpoint management is the process of ensuring that anything (including servers, desktops, laptops, tablets and smartphones) that’s used to access your company’s network is secured, monitored, and managed. Or, in simpler terms, it’s making…
Read More

Put It In the Cloud. It’s Safer There.

By Cloud Computing, Cybersecurity
Times Have Changed – For the Better It wasn't long ago – maybe 10 years – that the headline of this article would have blown my mind.  And I'd probably have dismissed this whole blog post as ridiculous propaganda.  But times have changed. If you're still a cloud naysayer, even after all this time, I don't expect this little post to fully change your mind.  But maybe it can put a chip in your preconceptions. And I'm not going deep here.  If you want to talk more, question my assumptions, or even rage from your rooftop, please feel free to…
Read More

3 Steps to Professional Vulnerability Management

By Cybersecurity
The IT Department Dream Scenario Imagine your CIO has the following information at his or her fingertips: Exactly how many machines are in their environment All the vulnerabilities for each device All the available patches A list of priorities to show which issues are most critical And what else could complete this dream scenario? For any patch that isn't available or installable, the team has a mitigation plan to address it. Are you already living the dream? Or did you just realize your vulnerability management isn't up to snuff? Keep reading and we'll explain how CIOs can sleep easier at…
Read More

How The Grinch Stole… Your Information – Part 1

By Cybersecurity
We'll start out by stating the obvious: Thieves stink. Nobody likes to get robbed. More so, nobody likes to admit that they didn't prevent thieves from entering their house and taking their stuff. So generally speaking, it is always a good idea to lock your house's windows and doors. Apply that same mindset to your home network. When most people think of their network, they focus on their laptop and desktop computers. But in this day and age, networks are much broader! Your network is comprised of your computers, phones, home automation components, smart TVs, smart appliances, and more. Each of…
Read More