by Steven McElveen | Apr 20, 2021 | blog
For any enterprise network, a firewall must be installed in various infrastructure locations to protect from attackers. Firewalls receive and analyze traffic based on layers of the Open Systems Interconnection (OSI) model. The OSI model is an industry standard that... by Steven McElveen | Apr 20, 2021 | blog
A stereotypical malware attack uses malicious macros or executables to deliver a payload onto a device. Anti-malware systems stop these files from executing by first scanning them and then quarantining them if anti-malware detects malicious binaries. Attackers are... by Steven McElveen | Dec 8, 2020 | blog
Having cryptographically secure solutions is required for many of the regulatory standards such as PCI-DSS, HIPAA, SOX and many others. If you store financial data or private consumer information, chances are that you need to implement a cryptographically secure... by Steven McElveen | Nov 23, 2020 | blog
Ransomware costs companies an average of $133,000 per attack (sophos.com/en-us/press-office/press-releases/2018/01/businesses-impacted-by-repeated-ransomware-attacks-according-to-sophos-global-survey.aspx), so it’s no surprise that this type of attack should be... by Steven McElveen | Nov 23, 2020 | blog
Your data is the backbone of your company’s productivity. Your database stores every aspect of your business, so you can never be too careful when creating a backup plan. The more time between backups, the more data you lose after a disaster. Disaster recovery... by Steven McElveen | Nov 23, 2020 | blog
With the COVID pandemic, many businesses were forced to allow employees to work from home in an effort to keep productivity active. While this has worked well for many companies, hackers are also aware of the lowered cybersecurity with an at-home workforce. Employees...