by Shawn Duffy | Aug 19, 2022 | Blog, Data Protection
Is there any organization with sensitive data that someone else isn’t trying to collect? We create processes, methodologies, and technical know-how. Even if we don’t have secret source-code or a cool product with intellectual property, every organization maintains...
by Shawn Duffy | Jul 28, 2022 | Blog, MSP
IT services are a crucial part of a business. Companies rely on managed service providers (MSPs) to ensure a host of operations such as email, file access, computer upgrades, software updates, anti-malware, anti-virus…. the list goes on. However, just because...
by Shawn Duffy | Jun 23, 2022 | Blog, risk assessment
We work on all these security controls, and then sit back and marvel at how well we have secured our system. Should we think of our secure system as secure only at a single point in time, one that needs us to constantly attend to it and be prepared to make changes to...
by Shawn Duffy | May 18, 2022 | Blog, continuous monitoring
It is rather obvious what continuous monitoring is all about. It’s a service that constantly examines your network for malicious and unusual activity. It’s like having a security guard on duty 24/7/365 to keep your network safe. But really, why do we continuously...
by Dawn Shuler | Apr 29, 2022 | Blog, Phishing, Security Awareness Training
100+ billion spam emails are sent each day, and 90% of successful breaches start with phishing. “What is phishing?” you might ask. It’s the fraudulent practice of sending emails that seem to be from individuals you know or reputable companies to...
by Shawn Duffy | Feb 25, 2022 | Blog, CMMC 2.0, Compliance, Cybersecurity, SPRS
As we’ve been helping our clients navigate the ever-changing compliance world, especially in terms of CMMC, we find that many people think a compliance effort is a one-and-done initiative. They enter the compliance journey thinking they might have to buy a few...