by Mike Wiener | Nov 10, 2022 | Blog, Security
For many organizations, multi-factor authentication—or MFA—is the first line of defense against the chance that an employee’s credentials have been compromised. If one of those credentials is compromised, the unauthorized user will fail subsequent tests and be blocked...
by John Bruggeman | Oct 13, 2022 | Blog, Security
When talking about information privacy, some people think it’s the same thing as information security, but for security professionals, they are not the same thing. If you talk about privacy, you are really talking about confidentiality. When talking about keeping...
by Ryan Hamrick | Oct 6, 2022 | Blog, Security
Absolutely EVERYTHING! As an attack vector, the computer supply chain is attractive one and attacks on it continue to rise. Most people view a supply chain attack as something that affects only hardware. A typical scenario would involve a malicious actor working in a...
by John Bruggeman | Sep 29, 2022 | Blog, Security
I am a shameless promoter of information security awareness and training (A&T). If I could get people to take three or four minutes of training on information security every week, I would do it. I want everyone to be able to detect phishing emails and fake text...
by Jana Dorton | Sep 21, 2022 | Blog, Digital Workspace, Security
The future (and arguably the present) of networking belongs to the Cloud. Legacy WAN networks deployed on aging MPLS systems can no longer handle the sheer amount of data, processing power, and security needed to keep businesses competitive. The resources required to...
by Mike Wiener | Sep 19, 2022 | Blog, Security
What do the search for old car parts and cyber reconnaissance have in common? Google dorking. Before you head off this page to check out life hack videos, let me explain. I have been using Google search, Google cache, and the Internet archive for years now to help me...
Recent Comments