by Eric Vibberts | Apr 17, 2020 | Blog, Security
Endpoint protection platforms (EPP): Endpoint protection, or endpoint security, describes cybersecurity services for network endpoints, like laptops, desktops, smartphones, tablets, servers, and virtual environments. These services may include next-generation...
by Brian Kubas | Apr 16, 2020 | Blog, Security
What is a Virtual Private Network (VPN) Transacting on an unsecured network means you could be exposing your private information. VPN services establish secure and encrypted connections to provide greater privacy than even a secured Wi-Fi hotspot. That’s why a virtual...
by Leo Cronin | Mar 27, 2020 | Blog, Security
This crisis we are in is not over, and although we have been talking about pandemic response for as long as I have been around security and BCP teams, it is very hard to anticipate, plan for, and react to black swans. The responses to COVID-19 and the structural...
by Justin Hall | Mar 27, 2020 | Blog, Security
After the smoke clears and we’re all allowed to go to bars again, organizations will be trying to answer a few questions. How well did we deal with this crisis? What have we learned? What changes for us the next time we have a similar crisis? Did what we just...
by Jeff Swan | Mar 27, 2020 | Blog, Security
Digital Transformation is defined as the process of exploiting digital technologies and supporting capabilities to create a robust new business model which is led by executive management or at the board level. With the onset of the Covid-19 pandemic, we have an...
by Sean Leinen | Mar 25, 2020 | Blog, Security
The basis for Network Access Control In the circumstances corporations now find themselves because of the Covid-19 pandemic, network segmentation deficiencies have been spotlighted as an alarmingly weak spot in modern network enterprises. A recent example was provided...
Recent Comments