(866) 978-3698
AV, NGAV, EDR, XDR, Oh my!

AV, NGAV, EDR, XDR, Oh my!

If your professional inbox looks anything like mine, it’s likely inundated with marketing and sales emails from endpoint protection vendors discussing their solution and how it will protect you from the latest threats. The acronyms used will vary depending on...
Passwordless Future 

Passwordless Future 

Imagine a world with no more passwords. No more prompts to enter a username and password before gaining access to a website, service, or workstation. You’ll no longer be inconvenienced by an expired or forgotten password that you must change. Sound far off or like an...
Password Management

Password Management

In keeping with the theme of the last post, we’ll continue to discuss authentication, but this time we will focus on password management. Much like MFA, password managers have become nearly a necessity in today’s world. While the general idea of a password manager is...
Crafting More Secure Firewall Rules – Part 2 

Crafting More Secure Firewall Rules – Part 2 

In part 2 of our series on crafting more secure firewall rules, we will focus on inbound traffic and how rules can be crafted to strengthen the security posture in your organization. We will highlight a few pitfalls and provide recommendations to tighten down these...