by Joshua Skeens | Mar 20, 2020 | Uncategorized
What is SD-WAN? SD-WAN is a software-defined approach to WAN, which in layman’s terms means leveraging software (typically on a hardware appliance) to utilize multiple WAN circuits (such as broadband, LTE, or MPLS). Traditional WANs aren’t designed for the additional...
by Joshua Skeens | Oct 15, 2019 | Security Best Practices, Uncategorized
SIEM’s Evolution Toward SOCSaas (& Why That’s a Great Thing for SMBs) Network protection is especially important for small-to-medium sized businesses, since over half of all cyber attacks are aimed at them. That’s mostly because smaller businesses are less likely...
by Joshua Skeens | Aug 1, 2019 | Security Best Practices, Uncategorized
After the Capital One Breach: How to Protect Yourself As you are probably well aware by now, it was announced this week that Capital One suffered a data breach of over 100 million customer accounts. The breach was discovered on July 19th and Capital One has stated...
by Joshua Skeens | May 22, 2019 | Uncategorized
G-Suite — not so sweet If you missed the news yesterday Google has announced that over a 14-year period, some G Suite passwords were stored in plaintext. Google’s VP of Engineering, Suzanne Frey, had the following comment “To be clear, these passwords remained in our...
by Joshua Skeens | Nov 20, 2017 | Uncategorized
Network Segmentation: Security Best Practice Series – Part 2 It is time to get some more valuable information into your hands. In Part 2 of our Security Best Practice series, we are discussing steps that you can take as a Network Administrator to help secure your...
by Joshua Skeens | Sep 8, 2017 | Uncategorized
Security Alert: Equifax Data Breach Unfortunately, news broke yesterday that Equifax (one of the top three companies in the US that calculates credit scores) was breached. This data breach might have allowed up to 143 million customer’s information to have been...
Recent Comments