Many of our clients are professionals with established businesses who have long term track records of success in their vocation. These business owners have made payroll decisions, hiring decisions, firing decisions, created strategic relationships, and…
Uncategorized
Your SIEM Is Showing!
Let’s exploit a popular SIEM solution called FortiSIEM to gain low privilege user access as ‘postgres’. Stay with me here! Low-priv access doesn’t sound cool, but for a SIEM tool this access allows attackers to…
Employee Cyber Security Training Seen as Lacking According to Recent Study
In spite of the growing recognition that cyber attacks are on the rise within the small business community, employee training is still rarely practiced according to Chubb Insurance Company’s 3rd annual cyber report. The report…
Why Should Cloud Be a Part of Your Disaster Recovery Strategy?
With cyber attacks frequently making headlines, leading organizations are looking closely at how they securely store data. At one end of the scale, unplanned downtime can lead to a drop in productivity and a heavy…
Know Your Enemy: Four Different Types of Data Breach
According to an article on Wikipedia “A data breach is a security incident in which sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.” Significant…
Does Your Company Take Cybersecurity Seriously?
Every modern organization knows that cybersecurity is a hot topic. From high profile breaches in the news to increased investment in security talent across industries, there is little doubt that companies need to wake up…
What is AI?
AI lives everywhere but may be one of technology’s most misunderstood fields of research. AI may be the most disruptive technology of all time and likely to spark a new industrial revolution. AI can be…
What is a Managed IT Service?
The rise in the number of companies attempting to both digitally transform their operations while simultaneously reducing expenditure has led to a surge in the managed service industry, whether that’s hardware, software, cloud solutions, or…
AI Infused Security As A Service
Due to the increase in business related cyber security threats, an entirely new breed of security focused technology companies is exploding with new products and services to address this growing threat landscape. As companies of…
What to look for in a secure cloud system
Not all cloud products support the same level of security, so what should organizations be looking out for? Against this backdrop, it is understandable that there are still a size-able number of businesses who are…