Blog

How do you currently manage your fleet of printers and copiers?

How do you currently manage your fleet of printers and copiers? For many small and medium-sized businesses, this question can often be an afterthought. Output devices like printers and copiers are often considered a non-core, though necessary, aspect of doing business. Your fleet assets are handling routine daily print and copy jobs as they come […]

How do you currently manage your fleet of printers and copiers? Read More »

Log Monitoring Overview

The technologies that you have invested in can provide even more value if you are able to analyze the log data effectively. Here are 5 key tips for effective log monitoring. What is log monitoring? Log monitoring is the practice of keeping an eye on the records that your computer creates about its activities. These

Log Monitoring Overview Read More »

What is Penetration Testing?

Penetration Testing (often called “Pen Testing”) is the practice of evaluating a computer system, network, or application to identify vulnerabilities and weaknesses that could be exploited by an attacker. Penetration Testing can be classified into three types, based on the level of knowledge the tester has about the target system: blackbox, graybox, and whitebox. In

What is Penetration Testing? Read More »

Can I replace my SIEM with MDR?

When you’re deciding how to spend your valuable cybersecurity budget, it’s important to understand the options and the differences between them. For example, there is a lot of confusion between MDR (Managed Detection and Response), and SIEM (Security Information and Event Management). Many people often wonder about the difference, and if you can replace your

Can I replace my SIEM with MDR? Read More »

The ABC’s of Cybersecurity

It’s becoming increasingly important for business owners, senior managers, and non-IT leaders to understand, at minimum, the basics of cybersecurity. Unfortunately, the cybersecurity industry doesn’t make it easy, with dozens of acronyms, dense jargon, and highly technical explanations of even simple concepts. That’s why we’ve designed our cybersecurity glossary as a primer for non-IT professionals.

The ABC’s of Cybersecurity Read More »

Is it time to check your defenses?

Cybersecurity isn’t a one-time, set-it-and-forget-it process. Instead, organizations that are serious about preventing attacks will need to be diligent in keeping their defenses up and running. When it comes to assessing and testing the security of a network to determine the existence of weaknesses in defenses, prudent organizations will work towards finding immediate solutions. For

Is it time to check your defenses? Read More »

Explaining Web Application Attacks

Healthcare web applications provide access for patients to make appointments and obtain copies of test results and medical records, but they may also put your practice at serious risk of a data breach. In an advisory issued on July 21, 2022, the Department of Health and Human Services Health Sector Cybersecurity Coordination Center warned that

Explaining Web Application Attacks Read More »

Scroll to Top