Remote Code Execution: Threats and Protection As seems to be the standard every year in cyber security, 2021 ended with quite the clamor. To give you some background and to help you better prepare for future threats, let’s talk about Remote Code Execution (RCE)...
Data breach losses are growing by double digits, with the average cost per breach now exceeding $4 million! Many companies are looking for ways to better prepare and protect themselves from those kinds of losses. Endpoint Detection and Response (EDR), Managed...
The trouble with passwords, and how to correct it While passwords have been an invaluable tool for over half a century, they are not without their drawbacks: if a password is discovered by a third party, there is nothing to stop them from authenticating as that user....
Cybercrime has grown into a multi-trillion-dollar problem affecting businesses of all sizes. Now more than ever, it’s critical to take the right security measures to protect your network and data Cybercriminals today will do anything to monetize your network, your...
There are many misconceptions about cyber security. Here are a few common examples, as well as how to better prepare for and avoid them. Myth #1: Cyber hackers only target large businesses Reality: If you’re a small and medium-sized business, you may think your data...
What is Network Segmentation? Network Segmentation is a configuration in which network and computer systems inside of a corporate network are divided into logical segments. These segments typically group devices with similar purposes together for a number of...