Watering Hole Attacks Named Top Cyber Threat for 2022: Here’s What You Should Know

Most of us are familiar with the common cyber attacks that are launched every day. We’re wary of unfamiliar emails and texts to avoid phishing attacks, and we keep our software up to date to prevent malware. Cyber crime is always evolving as bad actors seek new ways to trick users and overtake your email, […]
How Micro-Segmentation Reduces Your Attack Surface and Increases Network Visibility

Cyber security is a multi-layered practice. While your company may be strong in one area, weakness in another can leave you just as susceptible to a cyber attack. While we’ve discussed the benefits of endpoint visibility via Cisco Identity Services Engine (ISE), this type of segmentation differs from server-level micro-segmentation. A combination of both Cisco […]
Cisco Licensing Changes & End of Life Dates Your Business Should Know

Keeping your technology current means always looking ahead. For Cisco customers, we’ve compiled a list of everything that businesses and IT teams need to know as they plan ahead. Cisco Identity Services Engine (ISE) Release 3.0 Brings Licensing Changes Cisco ISE has numerous features that are mapped out to specific licenses and each business can […]
How to Make Your Business a Strong Candidate for Cyber Insurance

The increased use of technology throughout the pandemic means there is substantially more data out there for the taking. With more fish to catch, cyber criminals are out there “phishing” at every opportunity. This drastic increase in cyber crime has led to an interesting time for cyber insurance and has changed the cyber landscape in […]
Change is Coming to Microsoft’s New Commerce Experience: Here’s How it Could Affect You

Microsoft’s New Commerce Experience (NCE) is a multi-stage, multi-year transformational journey to deliver a simplified engagement experience. The goal of the NCE is to make it easier to transact with Microsoft and drive cloud adoption for businesses. The Cloud Solution Provider (CSP) program is the primary foundation for the NCE. While the NCE was initially […]
Need a Security Assessment? Here’s Where to Start

In today’s threat landscape, cyber security must be a top priority for businesses and enterprises. Cyber risks evolve just as rapidly as technology develops, meaning security efforts can never stop. With so much sensitive information at stake for businesses, their clients, and their customers, consistent cybersecurity assessments are a necessary practice to identify potential vulnerabilities and […]
Is Your Remote Work Experience Working for Your Company?

The pandemic brought on unprecedented disruption in the workforce. With only a matter of days to plan, anyone capable of working from a laptop was sent home. While remote work was already gaining popularity prior to the pandemic, in March 2020 the remote workforce boomed overnight. As IT departments had to act fast, many of […]
Top Cyber Security Lessons Learned from the Pandemic

As we move into year three of the COVID-19 pandemic, there’s no better time to reflect on the lessons we’ve learned over the past two years and how we can best plan for our “new normal” moving forward. While the hope is that many aspects of life will return to the pre-pandemic ways we used […]
365 Defender: An Overview of the 4 Pillars of Microsoft’s Security Suite

In March 2021, Microsoft announced that their endpoint, email, and collaboration security capabilities would be integrated into one, unified experience known as Microsoft 365 Defender. This became generally available in April 2021, allowing security teams to manage previously distinct portals (which will eventually be phased out) into a single, consolidated portal. As a part of […]
Getting to Know Cisco Identity Services Engine (ISE): Secure Your Network with Complete & Dynamic Visibility

A Zero Trust security framework has now become the cyber security industry standard, and for good reason. Zero Trust Security continually authorizes access of both users and devices, no matter the device’s location. As cyber threats continue to pose significant risk to every industry, this security model has become essential. Many companies face significant challenges […]