Do your logs matter? Using Syslog for better logging

Do your logs matter? Using Syslog for better logging

Do your logs matter? Using Syslog for better logging One of the things that can be overlooked in IT is proper logging. This is incredibly important and should not be neglected. Without proper logging in your IT environment, if you have a security incident your ability...
Are your third-party vendors a security risk?

Are your third-party vendors a security risk?

Your business most likely relies on third party vendors. Have you considered that partnering with the wrong vendor could result in financial losses and serious damage to your company’s reputation? Hackers intentionally go after companies that have access to other...
What exactly is Mobile Device Management (MDM)?

What exactly is Mobile Device Management (MDM)?

What exactly is Mobile Device Management (MDM)? In many organizations, employees have mobile devices that they use to do their jobs.  Those mobile devices can be tablets, smartphones, or other devices.  To be able to manage these devices, organizations often will use...
Business Email Scams, Whats the Cost?

Business Email Scams, Whats the Cost?

What is a Business Email Compromise Attack? Business email compromises are when an attacker impersonates the real owner of an email account to defraud the company, its customers, partners, or employees into sending money or sensitive data to the attacker How Does It...
Do you need Cybersecurity Insurance?

Do you need Cybersecurity Insurance?

Emerging trends Recent surveys show that nearly 50% of companies have cyber insurance policies, up considerably from just a few years ago. While insurance is nice to have there is no replacement for a proper cybersecurity program. Attacks are becoming more and more...