<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2923012&amp;fmt=gif">

What is a network security assessment?

Over the years, businesses’ mission-critical technology has expanded at a rapid pace. A network no longer consists of only servers, client computers, and basic networking equipment. Cloud computing has been introduced to host “X as a Service” solutions and applications that rely on big data, allow mobile and remote endpoints, network shares, and multiple communication applications, just to name a few. Even the solutions meant to secure the network and endpoints have grown complex to the point where a misconfigured security solution could leave an organization vulnerable.

This is why many organizations turn to outside partners to conduct a network security assessment. Having one performed by a trusted partner lets you know not only where your organization's security posture currently stands, but also what you can do to better protect yourself from the current threat landscape.

Read More

3 Tips When Creating an IT Security Strategy

When it comes to data breaches, the numbers don’t lie. The most recent Cost of a Data Breach Report from Ponemon shows that the average cost of a data breach is $3.92 million, and the average size comes in at over 25,000 records lost.

SMBs are no longer safe from the crosshairs of cybercriminals, either. According to Fundera, 43 percent of cyberattacks target small businesses, and three out of four SMBs don’t feel they have the personnel to properly address IT security.

Read More

Are You Getting the Most out of Your F5 BIG-IP?

When it comes to F5 BIG-IP and specifically F5 LTM products it can be easy to think of them as a mechanism for load balancing traffic and nothing more. What can be overlooked is that these devices are highly intelligent and offer a diverse range of ways with which you can optimize your traffic and further protect your network.

Read More

Streamlining Windows Updates with SCCM

As I sat down to write this article news broke of yet another major flaw affecting Windows systems. This time it’s a remote code execution vulnerability in Remote Desktop that could be exploited by a hacker via a worm making this a particularly dangerous flaw—view the details of this vulnerability. So it’s time to get patched!

Read More

4 Strategies for Overcoming Shadow IT

Research from Gartner shows that nearly 40 percent of all money spent on technology purchases comes from outside of the IT department. Those purchases are known as shadow IT. Most organizations can relate to the problem of shadow IT. Not only does it open the door to security issues, but it can cause conflicts with business critical applications. In addition to these problems, dealing with the issues of shadow IT pulls the IT staff away from projects meant to meet business goals.

Read More

Two Factor Authentication – Buy, Borrow or Loot

Two Factor Authentication (2FA) or Multi-factor Authentication (MFA) is the most common preventative measure that companies and organizations implement as an additional layer of security to the standard username and password login credentials on a website or application. Taking a half-step back, 2FA/MFA can be described as something you know and something you have. 2FA/MFA is currently used on almost every application, from banking websites to SaaS services to video games

Read More