Blog

The Rise of SD-WAN

Posted on

What is SD-WAN? One of the growing trends in corporate cyber security has been the adoption SD-WAN, or Software Driven – Wide Area Network, particularly gaining popularity amongst enterprises using more and more Internet devices and applications. Considered the latest and greatest network solution, SD-WAN provides advanced networking capabilities with top-notch firewall protection, essentially giving … Continue reading “The Rise of SD-WAN”

5 Tips to Keep Your Mobile Workforce Safe and Secure

Posted on

The American workforce has seen its fair share of paradigm shifts — globalization, the internet, and the introduction of cargo shorts and sandals in the workplace to name a few. The latest in labor initiatives has been the adoption of remote working. The spread of laptops and wifi internet has lead enterprises to begin sourcing … Continue reading “5 Tips to Keep Your Mobile Workforce Safe and Secure”

Defining the Eight Most Nefarious Cyber Threats.

Posted on

Here’s what very business professional should be informed about: Data breaches When a security incident involving protected or confidential data is copied, distributed, read, stolen, or used by unauthorized individuals, it can become a serious problem for the victims involved. The majority of data breaches happen due to vulnerable unstructured data such as files, documents, and sensitive information. A … Continue reading “Defining the Eight Most Nefarious Cyber Threats.”

Failing the Phish Test

Posted on

Phish testing your employees is a vital part of any security awareness program.  It seems logical that by exposing employees to phishing and helping them identify tactics, the chance of anyone in your organization to be phished lessens.  But does it? When employees who failed phish tests are called out, made to feel poorly or … Continue reading “Failing the Phish Test”