Wish You Were Here: Why You Should Let Your IT Team Know When You’re Going Out of the Country The Importance of Keeping Your Conditional Access Policies Current IN THIS ARTICLE: Understanding Conditional Access Conditional Access: Location Restrictions Why Your IT Team Needs to Know About Travel Plans How to Notify Your IT Team When… Read more »
Category: Cybersecurity
Staying Frosty: How to Keep Calm and Stay Alert Against Spoofing and Phishing By Micah Ulrick, vCIO IN THIS ARTICLE: Understanding Spoofing & Phishing: What You Need to Know How to Spot Spoofing and Phishing Red Flags Advanced Threats to Be Aware Of Remember These Best Practices We’ve said it before, but I’ll say it… Read more »
Email Authentication Protocols to Protect Your Business By Peter Summers, vCIO IN THIS ARTICLE: Email Authentication Protocols: DKIM, DMARC, and SPF DKIM, or DomainKeys Identified Mail SPF, or Sender Policy Framework DMARC, or Domain-Based Message Authentication, Reporting, and Conformance A Dynamic Trio- Summary Email is an essential tool for businesses and individuals alike, making it… Read more »
A Hands-On Deep Dive Into CrowdStrike Identity Protection By Eric Egolf, CEO As system administrators navigating the intricate web of cybersecurity solutions, we often uncover hidden gems that revolutionize our approach to managing digital security. One such treasure within the CrowdStrike suite is the Identity Protection Module (IDP). As we began exploring this module, we… Read more »
Enhancing Cybersecurity with CrowdStrike Identity Protection By Eric Egolf, CEO In the realm of cybersecurity, staying ahead of threats is crucial. Organizations require comprehensive solutions that not only detect but also preemptively prevent potential breaches. CrowdStrike, recognized for its top-tier Endpoint Detection and Response (EDR), goes above and beyond by offering additional value-added modules. Among… Read more »
Safeguarding Your Business Beyond Device Security: The Rising Importance of Identity Protection By Eric Egolf, CEO IN THIS ARTICLE: What is User Identity About Identity Protection Solutions In today’s digital landscape, IT security is a hot topic of discussion, and for good reason. Security is a constantly changing and complex field and while it may… Read more »
Neglecting MFA: The Scary Reality of Your Business Risk IT security is more important than ever. Cyber-attacks and data breaches are a daily occurrence, they just don’t all make headlines. Businesses that fail to take proactive security measures put not only themselves at risk, but their customers too. One of today’s foundational security measures is… Read more »
Email Safety | 5 Ways to Spot a “Phishy” Email Quick Tips & Best Practices We rely on email for many functions of business today. This makes it an excellent tool for bad actors to exploit. Email is one of the quickest and easiest opportunities threat actors have at their disposal. Threat actors have gotten… Read more »
Reframing Your Approach to IT Security Decisions By Sean Gill, vCIO The IT security landscape has continued to shift rapidly over the past couple of years. Threat actors leverage creative social engineering techniques, phishing and spoofing threats are continuously rising, zero-day vulnerabilities are exploited, and ransomware is at large. Businesses are more reliant on technology… Read more »
Understanding The Enemy + Why Your Antivirus Isn’t Enough By Russ Levanway You probably saw a dominant story in the news a couple of months ago about a major fuel shortage across the eastern seaboard. The pipeline that provides almost half the oil to the northeast and south came under a cyber-attack. Gas pumps… Read more »