Technical Support: 412-349-6678 | Incident Response

Category: Our Blog

June Software updates

These June Software Updates Require Your Attention

Every month brings a slew of new security upgrades you need to address. While some months are certainly busier than others, like April’s 128 Microsoft vulnerabilities, every one should be treated as an important opportunity to correct potential flaws. This month, June’s Patch Tuesday (that exciting day when a host...
Zero-Day Vulnerabilities

When Should You Worry About Zero-Day Vulnerabilities?

Zero-day vulnerabilities make headlines and receive coverage because they’re new and exciting (well, at least to cybersecurity enthusiasts).So, what are they? Why do they steal the headlines?Well, simply put, zero-day vulnerabilities are flaws discovered in software or hardware which have not yet received a corrective patch from the creator. Through...
Zero Trust Security - Ideal Integrations

Is Zero Trust Security Right for Your Business?

One year ago, President Biden issued an Executive Order to improve cybersecurity for federal agencies.In particular, the order centered around Zero Trust Architecture (ZTA), a strategy (and term) first devised by Forrester Research analyst John Kindervag in 2010.Yet, even with the order in place, the Zero Trust security framework developed...
Antivirus - is it enough for your business?

Is Traditional Antivirus Enough for Your Business in 2022?

Endpoints are where human interactions happen between your data, your network and, unfortunately, malware.So, you know you need endpoint protection for these devices. But where do you begin?Traditional antivirus software (AV)? Next-generation antivirus (NGAV)? Or something more substantial, like endpoint detection and response (EDR) solutions?Superficially, there’s not much difference between...
Password Security - passwords on a sticky pad

This Simple Trick Will Enhance Your Organization’s Password Security

Though World Password Day (May 5) has come and gone, the need for strong password security is a year-long event. Passwords remain one of the most used, most criticized, and least expensive security authentication methods available. Though new data shows possible improvements in general password hygiene, there’s still plenty of...