Search Results

Searching for: "defense in depth"

Defense In Depth – DNS Filtering

Well folks, we’ve finally made it to the last Defense In Depth blog and layer of our Layered Security Strategy: DNS Filtering. As more people use the Internet and depend on it, the …

Read More

Defense In Depth – IT Assessments And Monitoring

So far, we’ve talked about the first five layers of our Layered Security Strategy. From endpoint protection and Next-Generation firewalls (NGFWs), to email security, MFA, and end-user training, you’d think we’ve covered it all. However, there are …

Read More

Defense In Depth – Next-Generation Firewalls

In our previous Defense In Depth blog, we talked about the first layer in our Layered Security Strategy: The importance of endpoint protection and security. In this blog, we’ll cover all things …

Read More

How End-User Training & SAT Strengthen Cybersecurity

We’ve talked about many different aspects that go into having a layered security strategy in our previous Defense In Depth blogs. Now, let’s talk about the fifth layer of our Layered Security …

Read More

The Art of Multi-Factor Authentication (MFA)

In our previous Defense In Depth blog series, we’ve delved into the realms of Endpoint Protection, Next-Generation Firewalls (NGFWs), and the intricacies of Email Security. Now, we’re about to unlock a new level …

Read More

Safeguarding Your Business With Email Security

Our previous Defense In Depth blog covered next-generation firewalls (NGFW). The next layer in our Layered Security Strategy is all about email security and how it plays a vital role in your business’s overall …

Read More

The Importance of Endpoint Protection & Security

In today’s digital age, the security of your endpoints (i.e., laptops, tablets, smartphones, etc.) has become more critical than ever. With the rise of remote work and BYOD policies, the attack surface …

Read More

A Modern IT Environment With Immutable Storage

The Modern IT Environment PART 1 The modern IT environment is terrifying. There’s no other way to put it. It used to be that all you had to do was …

Read More

URGENT: Zero-Day Exploit in Exchange Server, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065

There is a zero-day exploit in the wild that allows bad actors to obtain full control over an Exchange server, which then gives access to other internal resources. Microsoft released …

Read More

Visibility and Control Over OT is More Critical Than Ever for Louisville Manufacturers

If you’re in Louisville’s manufacturing industry scene, you’ve probably noticed the incredible growth we’re experiencing. Our city’s industrial sector is booming, with over 1,300 facilities calling Kentucky’s largest city home. …

Read More

The Rise of Ransomware is Impacting Businesses in Louisville

Have you heard about what happened at the Jefferson County Clerk’s Office in Louisville, KY back in July? Hackers hit them hard, shutting down operations for almost four days. They …

Read More

Password Best Practices

Ah, the password. A necessary evil. If by now, at some point, forgetting or changing your password with the ever-evolving requirements hasn’t caused you to want to throw your laptop …

Read More

Press enter to search