Well folks, we’ve finally made it to the last Defense In Depth blog and layer of our Layered Security Strategy: DNS Filtering. As more people use the Internet and depend on it, the …
So far, we’ve talked about the first five layers of our Layered Security Strategy. From endpoint protection and Next-Generation firewalls (NGFWs), to email security, MFA, and end-user training, you’d think we’ve covered it all. However, there are …
In our previous Defense In Depth blog, we talked about the first layer in our Layered Security Strategy: The importance of endpoint protection and security. In this blog, we’ll cover all things …
We’ve talked about many different aspects that go into having a layered security strategy in our previous Defense In Depth blogs. Now, let’s talk about the fifth layer of our Layered Security …
In our previous Defense In Depth blog series, we’ve delved into the realms of Endpoint Protection, Next-Generation Firewalls (NGFWs), and the intricacies of Email Security. Now, we’re about to unlock a new level …
Our previous Defense In Depth blog covered next-generation firewalls (NGFW). The next layer in our Layered Security Strategy is all about email security and how it plays a vital role in your business’s overall …
In today’s digital age, the security of your endpoints (i.e., laptops, tablets, smartphones, etc.) has become more critical than ever. With the rise of remote work and BYOD policies, the attack surface …
The Modern IT Environment PART 1 The modern IT environment is terrifying. There’s no other way to put it. It used to be that all you had to do was …
There is a zero-day exploit in the wild that allows bad actors to obtain full control over an Exchange server, which then gives access to other internal resources. Microsoft released …
If you’re in Louisville’s manufacturing industry scene, you’ve probably noticed the incredible growth we’re experiencing. Our city’s industrial sector is booming, with over 1,300 facilities calling Kentucky’s largest city home. …
Have you heard about what happened at the Jefferson County Clerk’s Office in Louisville, KY back in July? Hackers hit them hard, shutting down operations for almost four days. They …
Ah, the password. A necessary evil. If by now, at some point, forgetting or changing your password with the ever-evolving requirements hasn’t caused you to want to throw your laptop …