Endpoint Security Management: The What, Why and How

Endpoint Security Management: The What, Why and How

Now more than ever, organizations need to quickly identify and respond to device threats and see into their assets’ inventory and usage. With today’s remote and hybrid workforce, many organizations struggle to monitor and remotely track devices that operate off the...
Cyberattacks: Some Scary Stats and How to Reduce the Threat

Cyberattacks: Some Scary Stats and How to Reduce the Threat

Cyberattacks are growing at an alarming rate, but you may not know the extent of it.  In Q4 2021, there was an all-time peak in weekly cyberattacks, totaling over 900 attacks per organization  In 2021, there was an increase of 71% in overall attacks per week on...
The Dark Web: What You Need to Know

The Dark Web: What You Need to Know

First, what is the dark web? Maybe you’ve heard something about the “dark web” being a hotbed of criminal activity — and it is. But maybe you don’t know exactly what the dark web is. Basically, it’s a part of the internet that isn’t indexed by search engines.  ...
How a Password Manager can Help Reduce Data Breaches

How a Password Manager can Help Reduce Data Breaches

Over 80% of company data breaches are due to poor passwords.  Weak, easy-to-crack passwords are one of the common causes of data breaches. Strong business password hygiene and practices are critical in order to avoid data breaches. However, traditional password...
Remote Code Execution: Threats and Protection

Remote Code Execution: Threats and Protection

Remote Code Execution: Threats and Protection  As seems to be the standard every year in cyber security, 2021 ended with quite the clamor. To give you some background and to help you better prepare for future threats, let’s talk about Remote Code Execution (RCE)...