How IoT Impacts B2B

How IoT Impacts B2B

The Internet of Things (IoT) has reached consumers in many ways. There are “smart” thermostats, refrigerators, lights, and home security systems that leverage the connection of the internet. For businesses, the IoT has also entered their networks in several ways. In...
How Old Threats Can Cause Big New Problems

How Old Threats Can Cause Big New Problems

Windows released XP in 2001, and in 2009 they ended support for it. However, in 2019, they released updated patches for Windows XP and Windows Server 2003. Why? Because they identified a vulnerability in the unsupported operating systems that hackers could exploit....
The Security Angle for using CCleaner

The Security Angle for using CCleaner

Since our business is focused on Security, we talk a lot about the threat landscape. Many attacks are focusing on password stealing. Once an attacker has legitimate credentials the attack surface widens greatly. Protect Your Passwords To avoid this, we have several...
Everything You Need to Know about Emotet

Everything You Need to Know about Emotet

Emotet may sound like an ancient Egyptian pharaoh, but it’s actually something much more current. It’s a banking Trojan that has been wreaking havoc and stealing banking information from individuals and businesses since 2014. Emotet has evolved since its inception and...
Co-Managed SOC

Co-Managed SOC

The topic of the day in security as of late has been Endpoint Detection and Response (EDR).  The buzz has created a lot of conversations with our clients about Threat Hunting, Threat Remediation and Indicators of Compromise.  The challenge for many of our clients is...