by Joshua Skeens | Jan 22, 2020 | Security Best Practices
What is a Firewall, & Why is it Important? The death of the firewall has been going around for years and continues today. Let me first say this, the firewall, as many of us know it died 10+ years ago. If I compared a firewall today to my first experience...
by Joshua Skeens | Dec 23, 2019 | Security Best Practices
What Questions to Ask When Choosing Your Security Solution Joshua Skeens, CTO, December 23, 2019 Recently, I spoke at a cybersecurity conference, and between talks, I decided to wander through the vendor area. As I was walking through this vast, crowded room, I...
by Joshua Skeens | Dec 16, 2019 | Security Best Practices
Technology is Moving to the Cloud: What Does That Mean for Your Business? Joshua Skeens, CTO, December 16, 2019 The cloud has been a popular choice among businesses for years, and its popularity continues to rapidly increase as companies of all sizes migrate...
by Joshua Skeens | Nov 6, 2019 | Security Best Practices
Securing Your Remote Workforce From Cyber Threats: 2020 Edition Joshua Skeens, CTO, November 6, 2019 The internet has revolutionized how we do business and changed the nature of the office. While employees were once required to be on-site, now more...
by Joshua Skeens | Oct 30, 2019 | Security Best Practices
The Set & Forget Myth: Why Your Security Posture Can’t Be Forgotten About Joshua Skeens, CTO, October 30, 2019 Cybersecurity isn’t something that can be approached with a “set it and forget it” attitude. Unfortunately, too many companies get bogged...
by Joshua Skeens | Oct 22, 2019 | Security Best Practices
DoH and DoT: What They Mean & Should You Care? Jeremiah Johnson, Principal Network Engineer, October 22, 2019 With security and privacy at the forefront of everyone’s minds, from your home virtual assistant to your mobile phone data, internet browsing is no...
by Joshua Skeens | Oct 15, 2019 | Security Best Practices, Uncategorized
SIEM’s Evolution Toward SOCSaas (& Why That’s a Great Thing for SMBs) Network protection is especially important for small-to-medium sized businesses, since over half of all cyber attacks are aimed at them. That’s mostly because smaller businesses are less likely...
by Joshua Skeens | Oct 3, 2019 | Security Best Practices
Higher Education Requires Higher Cybersecurity The sheer amount of data that colleges, universities, and other post-secondary schools deal with on a daily basis is practically unfathomable. As such, higher education is embracing modern networking technology because of...
by Joshua Skeens | Sep 3, 2019 | Security Best Practices
Small Changes to Your Operations That Will Significantly Improve Your Security Posture Crafting and implementing a robust cybersecurity policy can be a daunting task for many business owners. A good MSSP can help you create policies that are tailored to meet your...
by Joshua Skeens | Aug 19, 2019 | Cerdant Services, Security Best Practices
Technology is Outpacing People: Why Your Business Should Consider Outsourcing its Cybersecurity Cybersecurity is becoming increasingly important as cybercriminals continue to target businesses and other organizations. Cybercriminals are constantly evolving and...
Recent Comments