Why You Should Let Your IT Team Know When You’re Going Out of the Country

Wish You Were Here: Why You Should Let Your IT Team Know When You’re Going Out of the Country The Importance of Keeping Your Conditional Access Policies Current  IN THIS ARTICLE:  Understanding Conditional Access Conditional Access: Location Restrictions Why Your IT Team Needs to Know About Travel Plans How to Notify Your IT Team When… Read more »

Staying Frosty: How to Keep Calm and Stay Alert Against Spoofing and Phishing

Staying Frosty: How to Keep Calm and Stay Alert Against Spoofing and Phishing By Micah Ulrick, vCIO IN THIS ARTICLE:  Understanding Spoofing & Phishing: What You Need to Know How to Spot Spoofing and Phishing Red Flags Advanced Threats to Be Aware Of Remember These Best Practices We’ve said it before, but I’ll say it… Read more »

Email Authentication Protocols to Protect Your Business

Email Authentication Protocols to Protect Your Business By Peter Summers, vCIO IN THIS ARTICLE:  Email Authentication Protocols: DKIM, DMARC, and SPF DKIM, or DomainKeys Identified Mail SPF, or Sender Policy Framework DMARC, or Domain-Based Message Authentication, Reporting, and Conformance A Dynamic Trio- Summary Email is an essential tool for businesses and individuals alike, making it… Read more »

A Hands-On Deep Dive Into CrowdStrike Identity Protection

A Hands-On Deep Dive Into CrowdStrike Identity Protection By Eric Egolf, CEO As system administrators navigating the intricate web of cybersecurity solutions, we often uncover hidden gems that revolutionize our approach to managing digital security. One such treasure within the CrowdStrike suite is the Identity Protection Module (IDP). As we began exploring this module, we… Read more »

Enhancing Cybersecurity with CrowdStrike Identity Protection

Enhancing Cybersecurity with CrowdStrike Identity Protection By Eric Egolf, CEO In the realm of cybersecurity, staying ahead of threats is crucial. Organizations require comprehensive solutions that not only detect but also preemptively prevent potential breaches. CrowdStrike, recognized for its top-tier Endpoint Detection and Response (EDR), goes above and beyond by offering additional value-added modules. Among… Read more »

Username and password. Global network connection. Laptop on woo

Safeguarding Your Business Beyond Device Security: The Rising Importance of Identity Protection

Safeguarding Your Business Beyond Device Security: The Rising Importance of Identity Protection By Eric Egolf, CEO IN THIS ARTICLE: What is User Identity About Identity Protection Solutions In today’s digital landscape, IT security is a hot topic of discussion, and for good reason. Security is a constantly changing and complex field and while it may… Read more »

Hacker looking forward at words describing corporate data

Neglecting MFA: The Scary Reality of Your Business Risk

Neglecting MFA: The Scary Reality of Your Business Risk IT security is more important than ever. Cyber-attacks and data breaches are a daily occurrence, they just don’t all make headlines. Businesses that fail to take proactive security measures put not only themselves at risk, but their customers too. One of today’s foundational security measures is… Read more »

AdobeStock_285881213-resized

Email Safety | 5 Ways to Spot a “Phishy” Email

Email Safety | 5 Ways to Spot a “Phishy” Email Quick Tips & Best Practices We rely on email for many functions of business today. This makes it an excellent tool for bad actors to exploit. Email is one of the quickest and easiest opportunities threat actors have at their disposal. Threat actors have gotten… Read more »

paperclip-brain

Reframing Your Approach to IT Security Decisions

Reframing Your Approach to IT Security Decisions By Sean Gill, vCIO  The IT security landscape has continued to shift rapidly over the past couple of years. Threat actors leverage creative social engineering techniques, phishing and spoofing threats are continuously rising, zero-day vulnerabilities are exploited, and ransomware is at large. Businesses are more reliant on technology… Read more »

Cybercrime Concept

Understanding The Enemy + Why Your Antivirus Isn’t Enough

  Understanding The Enemy + Why Your Antivirus Isn’t Enough By Russ Levanway You probably saw a dominant story in the news a couple of months ago about a major fuel shortage across the eastern seaboard. The pipeline that provides almost half the oil to the northeast and south came under a cyber-attack. Gas pumps… Read more »