Search Results

Searching for: "cybersecurity"

Defense In Depth – Next-Generation Firewalls

In our previous Defense In Depth blog, we talked about the first layer in our Layered Security Strategy: The importance of endpoint protection and security. In this blog, we’ll cover all things …

Read More

Intel ‘Downfall’ Vulnerability Leaks Passwords

This is not good. A new vulnerability in numerous generations of Intel CPUs has been named “Downfall” by Daniel Moghimi, a security specialist at Google. Attackers can take advantage of the vulnerability …

Read More

FortiGate Security Vulnerability CVE-2023-29183

Fortinet has been a leading technological innovator, offering advanced security solutions like its FortiGate Next-Generation Firewall (NGFW) to numerous companies across the globe. The FortiGate platform’s robust security features have become a go-to …

Read More

Defense In Depth – The Importance of Endpoint Protection & Security

In today’s digital age, the security of your endpoints (i.e., laptops, tablets, smartphones, etc.) has become more critical than ever. With the rise of remote work and BYOD policies, the attack surface …

Read More

The Dark Side of QR Codes

Since the outbreak of the COVID-19 pandemic, thousands of restaurants and businesses have replaced tangible menus and guides with QR codes that link to webpages carrying the same information. While some …

Read More

Budgeting Series – How to Get Your Budget Approved

Well folks, it’s been a wild ride talking about budgeting. We started with your budget and IT environment as whole, then moved onto CapEx vs. OpEx, on premises vs. the cloud, IT budget cycles, and …

Read More

Budgeting Series – CapEx Vs. OpEx

Our previous blog covered your budget and IT environment as a whole. In this blog, we will be talking about the different ways your business can budget. In recent years, the trend …

Read More

Technical Debt – What It Is and How It Impacts Your Budget

It’s summer break up here in the United States, and most of us are taking some time off to hang with our kids or go on a trip. Well, enjoy …

Read More

Fortinet FortiGate SSL VPN Vulnerability CVE-2023-27997

Fortinet has issued an update in response to the revelation of a vulnerability that could enable unauthenticated remote code execution on endpoint devices. It is a heap-based buffer overflow bug, CVE-2023-27997. When this …

Read More

Let’s Talk About Office 365 Security Defaults

Office 365 Security Defaults have been… well, the default… for new Office 365 tenants since October of 2019. Time flies—I remember when they were brand new and we couldn’t figure …

Read More

How To Look At Your Office 365 Security Settings

Sometimes we all want a little reassurance that everything is alright. Did you know that any user in Office 365 can change security preferences, review their signed-in devices, and review …

Read More

BYOD to Work Could Be Causing More of a Headache to Your Network Than You Realize

Corporate and home networks are typically split into lanes of traffic that your computers are allowed to travel upon. These lanes determine how your devices communicate to different resources like …

Read More

Press enter to search