Blog

Latest Post

AI and The Future of Cybersecurity

AI and The Future of Cybersecurity

Cybersecurity has always been a rapidly evolving field, after all, security needs to try to keep up with hackers, malware, and other threats. Today, the latest evolution in cybersecurity is the use of AI to predict threats. Today, we’re seeing a wave of...

Recent

More Posts

How IoT Impacts B2B

The Internet of Things (IoT) has reached consumers in many ways. There are “smart” thermostats, refrigerators, lights, and home security systems that leverage the connection of the internet. For businesses, the IoT has also entered their networks in several ways. In...

How Old Threats Can Cause Big New Problems

Windows released XP in 2001, and in 2009 they ended support for it. However, in 2019, they released updated patches for Windows XP and Windows Server 2003. Why? Because they identified a vulnerability in the unsupported operating systems that hackers could exploit....

Office 365 Security, Backup, and Archiving

E-mail Security and Office 365 Okay, so you’ve moved to Office365, but did you bring your security with you?  Many organizations are under the impression that because Microsoft can stop a few e-mails and tag them as Spam or malicious that it includes e-mail security. ...

Everything You Need to Know about Emotet

Emotet may sound like an ancient Egyptian pharaoh, but it’s actually something much more current. It’s a banking Trojan that has been wreaking havoc and stealing banking information from individuals and businesses since 2014.

Island Hopping: The New Hacker Destination

When you think of island hopping, you may think of a Caribbean vacation, but when it comes to the security of your network, “island hopping” is far less relaxing. Island hopping is the new trend in cyber-attacks where attackers gain access to not just your network, but also your entire supply chain.

Co-Managed SOC

The topic of the day in security as of late has been Endpoint Detection and Response (EDR). The buzz has created a lot of conversations with our clients about Threat Hunting, Threat Remediation and Indicators of Compromise.