worth reading

Why Vulnerability Assessments Are Important

September 8th, 2020 by admin

Lit match burning binary code illustrating poor internet security

Vulnerability assessment refers to the process of identifying risks and vulnerabilities in computer networks, systems, hardware, applications, and other parts of the IT ecosystem. Vulnerability assessments provide your IT team and organizational management with the information they need to analyze...

Read Full Story »

Posted in: Security, Cyber Security, Managed Services

Understanding Zero-Day Threats and Their Importance in Security Strategy

August 19th, 2019 by admin

Understanding Zero-Day Threats and Their Importance in Security Strategy

Cybersecurity has never been simple. But, over the last decade, keeping up with the volume and severity of potential threats has become an overwhelming task for most organizations. Antivirus software and other traditional security solutions are effective at identifying and protecting against threats...

Read Full Story »

Posted in: Security, Cyber Security, Business Tools, Small Businesses

Vulnerability Scan vs. Pen Test: What’s the Difference?

January 22nd, 2019 by admin

Vulnerability Scan vs. Pen Test: What’s the Difference?

Why Security Testing is Important Each day, organizations of every size are being attacked from a multitude of angles and from all parts of the world. Many believe their network is safe because they have basic defenses, like a firewall and anti-virus software, in place. At the same time, very few have...

Read Full Story »

Posted in: Security, Business Advice, Business Tools

How to Evaluate a Managed Security Service Provider (MSSP)

November 19th, 2018 by admin

How to Evaluate a Managed Security Service Provider (MSSP)

Hiring a managed security service provider (MSSP) to manage your cybersecurity (sometimes also called Security-as-a-Service or SaaS) is a sound business move for organizations that have: limited IT resources, lack internal security expertise, struggle to hire security talent, or simply need to implement...

Read Full Story »

Posted in: Security, Cyber Security, Managed Services

What Are Managed Security Services?

August 16th, 2018 by admin

What Are Managed Security Services?

For Small and Mid-Sized Organizations Implementing a managed security program can provide your organization with a variety of benefits, but the primary advantage is to transfer the management and expense of an in-house cybersecurity team to a third-party that has the right technology, expertise, and...

Read Full Story »

Posted in: Security, Cyber Security, Managed Services, Small Businesses

What is SIEM, and How Does It Improve Security?

July 12th, 2018 by admin

What is SIEM, and How Does It Improve Security?

I recently came across a PowerPoint presentation entitled, “SIEM for Beginners: Everything You Wanted to Know, But Were Afraid to Ask.*” I want to share it here (in a re-formatted version), because it’s one of the best explanations I’ve come across on the subject. You don’t...

Read Full Story »

Posted in: Security, Cyber Security, Managed Services

What Is a Cyber Attack?

April 28th, 2018 by admin

What Is a Cyber Attack?

Today, security is everyone’s job—from consumers, to system administrators, to executives. If you’re doing business, you need to elevate the priority of security across your organization. Over the years, cybercriminals have gotten a lot more advanced and, because cybercrime is such...

Read Full Story »

Posted in: Security, Cyber Security, Managed Services, Small Businesses

Multi-Factor Authentication (MFA) Reduces Risk of Account Compromise

March 6th, 2018 by admin

Multi-Factor Authentication (MFA) Reduces Risk of Account Compromise

Authentication is the process of confirming that an individual is who he or she claims to be. It can involve providing information - like a username and password. Users can authenticate with an ATM card and PIN, a device that can generate or receive a code that can be used to log in, or a biometric...

Read Full Story »

Posted in: Security, Business Advice

Tips for Creating an Acceptable Use Policy

February 7th, 2018 by admin

Tips for Creating an Acceptable Use Policy

Organizations of all sizes need to worry about what their employees are doing with company computer equipment and internet connections. It's no longer just a matter of the cost of extra network bandwidth or tracking wasted time that should be spent on job duties. Organizations are now facing a growing...

Read Full Story »

Posted in: Compliance, Security, Business Advice, Cyber Security


Cal. Civ. Code § 1798.102 - Do Not Sell My Personal Information