Vulnerability scanning, the inspection of the network to detect any potential areas prone to exploit, is an essential part of a strong security posture. But how do you know if the type of scans you’re running, or the frequency of the scans is enough to protect your...
Perhaps It should be called “Lack of Support” Occasionally, when we have brought on a brand-new client and we uncover that they have been struggling with technical issues, some of which are easily solvable by support. Once we uncover this, we can usually get them on...
This is becoming one of my favorite phishing scams. Not just because it’s hilariously worded, but because the sender isn’t even putting in the effort to create malware, create a malicious site, or gain control over your account in any way. This is a pure bluff....
There is a lot of talk and news about file-less malware. We are encouraging our clients to learn and try new advanced protection products. But make no mistake, Antivirus is not going away because viruses are not going away. Low level hackers and individual hackers...
Not Just a Buzzword: Explaining Product Inertia In the world of endpoint and gateway security, product inertia creep is a dangerous force. But what exactly do we mean by that term? As you might imagine, we talk a lot amongst ourselves here about how we can help...
When your car doesn’t start, that is a usually a huge problem, since the fact that you are trying to start your car implies you need to use it. Same goes with the furnace. It may not work all summer, but if it is out in December you are not going to be happy (or...