March 17, 2023

Improve Your Cybersecurity Posture in 60 Days In today’s digital age, cybersecurity has become a critical concern for businesses of all sizes. With an increasing number of cyber threats and data breaches, it’s essential for businesses to take proactive measures to protect their assets, reputation, and customer trust. In this blog post, we’ll explore five […]

November 17, 2021

For effective network security monitoring, you need to see what devices are connected in your environment and how the vulnerabilities on those assets expose you to threats and intrusions. Attacks do not usually happen in one swift blow. Rather, they unfold in multiple steps. The earlier you detect attacks, the better chance you have at […]

November 17, 2021

Industrial processes and machines are becoming more smart and modular. A critical enabler of this transformation is the Internet of Things (IoT). Smart, always-connected devices provide real-time contextual information with low overhead to optimize processes and improve how companies and individuals interact, work, and live. View Video Transcript Mike Cromwell And where would you put […]

October 28, 2021

When you have cloud services on-premises it is vital to make sure that your organization’s technical architecture is secure to prevent hackers from stealing your organization’s data. If you are one of the few organizations in the world that has that expertise and skill set in house, consider yourself very lucky, but most organizations take […]

October 21, 2021

There are many elements to consider for a good Cybersecurity posture. In this week’s episode we are going to be talking about cloud on premises and why this is an important feature for security.

October 14, 2021

View Video Transcript Mike Cromwell How many times do you get hit on an average month? Brian DeVault It just kind of depends on what the exposure to the Internet is. So we have a server that we leave online, that’s on the Internet. We call it a honey pot, but we just leave it […]

October 6, 2021

If a hacker gains access to a PC, they potentially gain access to everything that our companies used to do business. You want to have endpoint protection in place to avoid such situations from occurring. Endpoint protection could mean a variety of different things. When you’re talking about next generation antivirus software malware prevention, anything […]

September 22, 2021

Many employees are restricted to working remotely, and much of this requires using a telephone or cellular device to contact customers. In this week’s episode we put together a strategic plan to become accustomed to the telecommuting strategy. View Video Transcript Mike Cromwell Welcome back to Whiteboard Wednesday. Mike Cromwell. Brian DeVault Brian DeVault. Mike […]

September 16, 2021

Hackers have become very good at what they do. The email chains that they send have become more advanced to the point you believe they are sent from a reputable source. They can have graphics and artwork that look identical to your business and maybe even have the same name as your boss’s email. Do […]