Unfortunately, these days most of us are very familiar with Phishing and Spear Phishing Attacks. Most often times hackers will target end users with a clever email that unwittingly opens an attack vector on the users machine. Once hackers have get access to the...
File-less malware is becoming more and more of a problem. Why? Because it’s working. Traditional Security solutions provide a great deal of protections for current environments. However, they also create a framework for how to propagate an attack. Most traditional...
Last week I was talking to Kirk Hoaglund of Clientek (www.clienktek.com) about web app development and security. Kirk’s firm helps companies bridge the gap between legacy on premier apps and the cloud. I wanted to know what tools folks were using to secure their...
Since debuting in 1999, Active Directory has been the go-to directory service for many mid-sized and enterprise companies. And though it has its issues, many of the companies that we see running Active Directory haven’t had it serviced in ages nor had old users,...
Why Do Networks Have Issues? When it comes down to it, there are countless reasons that a business or organization develops issues with its network health. But when it comes down to it, there tends to be three root causes that tend to be the cause of many of the...
If you are like our organization, you have already moved to Office365 or have a project in the works. If you are like me, once you made the move and got everything confirmed working, you moved on to the next big fire that needed attention. That being said, what we...