Are you Leaving Endpoints Exposed?

Are you Leaving Endpoints Exposed?

We all know the drill when it comes to data protection: make sure that you can failover servers and business-critical applications in the case of an outage, right? Well, in reality that’s only a fraction of the real picture. Most businesses these days are either...
Office 365 hacking: What you need to know

Office 365 hacking: What you need to know

There really is an app for almost everything — including one that cybercriminals use to hack into businesses’ systems. Cyberattacks have become so advanced that they are now aided by an app, like this one that poses serious threats to Office 365 users. If you’re using...
Security audits are more crucial than they seem

Security audits are more crucial than they seem

Security audits are an excellent way to set the benchmark for your company’s data integrity. It is also a reliable way of identifying gaps in your system before they can be exploited by hackers. Auditing and the security strategy Audits are necessary to maintain...
How to set up secure guest WiFi

How to set up secure guest WiFi

Today, WiFi isn’t only crucial for your employees to get work done; it’s also a necessary amenity for your office guests. But there’s a right way and a wrong way to set up guest WiFi, and the latter can result in a frustrating experience for you and your users. So,...
Windows Administrative Shares – Deep Dive

Windows Administrative Shares – Deep Dive

Our ThreatOps team continues to see new Emotet, Trickbot, and Qakbot malware outbreaks within networks — regardless of antivirus, anti-spam, or firewall solutions. As a result, we’ve become too familiar with the hurdles businesses face when attempting to contain these...