Category: Cyber Security

20

Jul2023
Microsoft SharePoint has gained recognition as a leading intranet solution renowned for its extensive features and seamless integration capabilities. SharePoint distinguishes itself from the competition for several compelling reasons. By seamlessly integrating with Microsoft Suite, including Office 365, Outlook, and Teams, SharePoint empowers organizations with a unified collaboration and communication ... Read More
July 20, 2023Heather Puckett

18

Apr2023
What are the advantages of SASE (Secure Access Service Edge) over other security options? Secure Access Service Edge (SASE) is a cloud-based network security solution that combines wide area networking (WAN) capabilities with comprehensive security features such as secure web gateways, firewall as a service, and zero-trust network access. SASE is ... Read More
April 18, 2023Tommi

12

Aug2021
Cyber attacks are on the rise and only getting more frequent. It's imperative for your business to have an effective strategy to protect against data breaches, malware, spyware and other threats that could compromise your company. Because most businesses are technology-driven, IT systems are central to your organization’s success. With that ... Read More
August 12, 2021Chris Torbit

09

Oct2019
Ransomware - a new form of malware - is becoming an increased threat for businesses of every size. Ransomware is a version of malware that targets and encrypts a company's data and a ransom is demanded from the cyber criminals in order to obtain the decryption key to unlock our ... Read More
October 9, 2019Chris Torbit

10

Apr2019
Penetration testing, also referred to as "pen testing" or "ethical hacking", is the process of testing a computer network, application or computer system to identify security issues that could be exploited by a cyber attacker. This testing is also referred to as a "white hat attack" because in a pen ... Read More
April 10, 2019Chris Torbit

03

Apr2019
DNS hijacking, also referred to as DNS redirection, is a specific type of cyber attack, wherein a "bad actor" can redirect queries to a domain name server, by overriding TCP/IP settings often by hacking and modifying a server's settings. DNS hijacking is frequently used for phishing - displaying fake versions ... Read More
April 3, 2019Chris Torbit