Case Study – Kraft Technology, MSP

CASE STUDY

Challenge

The company wanted to maintain their high level of standards while providing the best cybersecurity solutions and services for their customers. Company President, Don Baham, said his “desire to reshape how we operated,” coupled with his […]

By |2020-03-05T20:16:51+00:00March 5th, 2020|Case Studies|Comments Off on Case Study – Kraft Technology, MSP

What is SOAR and Why is it Important?

Security Orchestration, Automation and Response (SOAR) has been getting a lot of attention recently. I thought it would be good to take a moment and discuss what it is and why it is important to the industry. 

Gartner was the […]

By |2020-02-21T20:35:51+00:00January 27th, 2020|Blogs, Home Page, News, Resource Featured Post|Comments Off on What is SOAR and Why is it Important?

Practices that Leave Your Company Vulnerable to Cyber Attacks

It’s easy to pick up bad habits. Cybersecurity companies know that this is especially true when it comes to online habits. We become focused on our tasks and meetings and small security measures […]

By |2020-02-06T19:38:44+00:00January 21st, 2020|Articles|Comments Off on Practices that Leave Your Company Vulnerable to Cyber Attacks

Five Ways to Optimize Your SIEM

Today, antivirus programs can no longer keep you protected from online threats that have breached millions of systems across the globe. Cybersecurity companies exist to protect businesses and organizations that are looking to fortify themselves against cyber-attacks. The best way […]

By |2019-12-12T21:35:37+00:00December 12th, 2019|Articles|Comments Off on Five Ways to Optimize Your SIEM

Is MFA Enough? No, It is Not

Anyone in the cybersecurity field will tell you that enabling Multi-Factor Authentication is the single most important service to prevent nefarious account take-overs. While this information is true, it is also artificially imputed that with MFA enabled, password security is […]

By |2020-02-14T13:04:55+00:00November 26th, 2019|Blogs, Home Page, Resource Featured Post|Comments Off on Is MFA Enough? No, It is Not

Benefits of a SIEM with Advanced Configuration

It is 3:00 am and you get a call from your service provider that monitors your network for cybersecurity attacks. These are the calls you dread.  The analyst tells you they are seeing a real-time MS-SQL injection attack. The attack is […]

By |2019-11-25T18:43:34+00:00November 25th, 2019|Blogs|Comments Off on Benefits of a SIEM with Advanced Configuration