In our previous Defense In Depth blog, we talked about the first layer in our Layered Security Strategy: The importance of endpoint protection and security. In this blog, we’ll cover all things …
This is not good. A new vulnerability in numerous generations of Intel CPUs has been named “Downfall” by Daniel Moghimi, a security specialist at Google. Attackers can take advantage of the vulnerability …
Fortinet has been a leading technological innovator, offering advanced security solutions like its FortiGate Next-Generation Firewall (NGFW) to numerous companies across the globe. The FortiGate platform’s robust security features have become a go-to …
In today’s digital age, the security of your endpoints (i.e., laptops, tablets, smartphones, etc.) has become more critical than ever. With the rise of remote work and BYOD policies, the attack surface …
Since the outbreak of the COVID-19 pandemic, thousands of restaurants and businesses have replaced tangible menus and guides with QR codes that link to webpages carrying the same information. While some …
Well folks, it’s been a wild ride talking about budgeting. We started with your budget and IT environment as whole, then moved onto CapEx vs. OpEx, on premises vs. the cloud, IT budget cycles, and …
Our previous blog covered your budget and IT environment as a whole. In this blog, we will be talking about the different ways your business can budget. In recent years, the trend …
It’s summer break up here in the United States, and most of us are taking some time off to hang with our kids or go on a trip. Well, enjoy …
Fortinet has issued an update in response to the revelation of a vulnerability that could enable unauthenticated remote code execution on endpoint devices. It is a heap-based buffer overflow bug, CVE-2023-27997. When this …
Office 365 Security Defaults have been… well, the default… for new Office 365 tenants since October of 2019. Time flies—I remember when they were brand new and we couldn’t figure …
Sometimes we all want a little reassurance that everything is alright. Did you know that any user in Office 365 can change security preferences, review their signed-in devices, and review …
Corporate and home networks are typically split into lanes of traffic that your computers are allowed to travel upon. These lanes determine how your devices communicate to different resources like …