Cybersecurity for SMBs and MSPs
In light of the recent Kaseya supply-chain attack, the relationship between IT/manged services providers and small to mid-sized businesses has come to the forefront. Responsibility…
In light of the recent Kaseya supply-chain attack, the relationship between IT/manged services providers and small to mid-sized businesses has come to the forefront. Responsibility…
I’ve seen quite a bit of Google Chrome Remote Desktop in the wild as of late, and to me it presents some challenges worth talking…
“An ounce of prevention is worth a pound of cure.” Here are some useful bits of info that might help justify cybersecurity program improvements: According…
For quite some time this has been difficult to find. NIST SP 800-171 and the CMMC require the use of FIPS validated cryptography when protecting…
For those looking for information on CUI training or additional CUI resources, here are a few helpful links: DoD Mandatory Controlled Unclassified Information (CUI) Training…
Background You might see it referred to as 2FA, MFA, or 2-step, but it all refers to having an additional authentication mechanism when we log…
IT professionals and power users employ all sorts of utilities for daily tasks. Often, a quick search will suggest several options that might work for…
A great example popped up today regarding truly effective vulnerability management. Many businesses have automated patching tools, and some may be under the impression that…