by Joshua Skeens | Jul 16, 2021 | Security Best Practices
By: Joshua Skeens Improving your cybersecurity and keeping all your devices, users, and data safe may seem like a daunting task, but that is where this two-part guide and the experts at Cerdant come in. showed you how to begin fortifying your cybersecurity...
by Joshua Skeens | Jul 9, 2021 | Security Best Practices
By: Joshua Skeens No matter how large or small your organization is, cybersecurity is critical. All organizations need to take steps to safeguard their digital assets, including identifying current deficiencies, creating a comprehensive and actionable plan, sourcing...
by Joshua Skeens | Nov 10, 2020 | Cerdant Services
When our team looked at the different SIEM and SOC services currently available on the market, we felt there had to be a better way. In the early days of Cerdant, I used to hear the comment, “I’m not worried about hackers. I’m too small. What could they possibly take...
by Joshua Skeens | Oct 28, 2020 | Cerdant Services
The 2 questions I am asked most regularly are “What is your biggest concern in cybersecurity right now?”, and “What are your favorite resources for cybersecurity news and information?” As I’m sure you can imagine, my answers can shift quite rapidly depending on...
by Joshua Skeens | Oct 15, 2020 | Cerdant Services, Software & Tools
There are a variety of ways to approach managed security services, each of which has strengths and meets different needs. Determining which approach works best for your company is crucial for both safeguarding your digital assets and giving you access to the data you...
by Joshua Skeens | Jun 22, 2020 | Security Best Practices, Software & Tools
Once ubiquitous, traditional anti-virus (AV) software has seen a sharp decline in popularity due to its limited protection capacity. However, recent innovations in the AV sphere, such as the adoption of machine learning algorithms and AI, have reinvigorated this...
by Joshua Skeens | Mar 20, 2020 | Uncategorized
What is SD-WAN? SD-WAN is a software-defined approach to WAN, which in layman’s terms means leveraging software (typically on a hardware appliance) to utilize multiple WAN circuits (such as broadband, LTE, or MPLS). Traditional WANs aren’t designed for the additional...
by Joshua Skeens | Feb 28, 2020 | Security Best Practices
It’s almost impossible to do business these days without relying on the internet. Unfortunately, though the internet has revolutionized how we do business, not all the changes it has brought with it have been positive. Cybercrime continues to be a worldwide threat,...
by Joshua Skeens | Feb 19, 2020 | Cerdant Services, Security Best Practices
We Take PCI Compliance Seriously: Here’s Why That Matters If your organization touches money, you’ve probably heard of PCI compliance. But what does it actually mean, and how can it affect your business? PCI compliance is vital for any business that processes credit...
by Joshua Skeens | Jan 29, 2020 | Security Best Practices
Important Signs That Show Your Network Isn’t as Secure as You Think While the old saying “no news is good news” may apply in some cases, a solid cybersecurity strategy relies on accurate, up-to-date information and regular monitoring to safeguard your...
Recent Comments