Blog

Buchanan County 041

CISA Test Failed to Penetrate Local Government Network Defended by ThinkGard

Security assessments by the Cybersecurity and Infrastructure Security Agency (CISA) are the gold standard for validating cybersecurity effectiveness for government entities. These assessments mimic actions that threat actors might take to get into an IT system. They’re usually successful at…

Blog RW AUG 2022

Data Recovery isn’t always enough

Just because you can recover your data after ransomware doesn’t mean you won’t suffer losses. Let’s say your company lost its data but fortunately managed to get it all back. Either by recovering the data from an offsite storage, an…

First Car Blog

What’s Your Favorite User Credential Your Employees Give Up?

As an IT professional, you’ve got a sixth sense about scams that kicks in on social media. That’s why it’s probably frustrating to see your family and friends on social media posting funny memes with crazy questions. It’s all in…

Work from home

Ways to Avoid a Cyber Disaster from Your Remote Workforce

At the office, you’re able to set up security on your users’ laptops. But how about the computers your employees use at home? When browsing the internet, opening emails, and downloading documents, are your employees’ home computers just as secure?…

Best buy

How Simple Tricks Can Bypass Your Cybersecurity Tools and Technology

A while back, a young salesperson at our company appeared to receive an email from an officer of the company that read: Britney, I need a huge favor and I normally wouldn’t ask you to do this but it’s time…

Robot USB

USB Drives: Shiny Objects That Lead to Cybersecurity Headaches

It’s one of your many nightmares as an IT director. An employee is walking along and finds a flash drive in the company parking lot. They want to be a good Samaritan and return the flash drive to its owner.…

CyberSecurity Flipped

Security as a Service: Because You Never Planned on Being a Security Expert

More and more fully staffed IT departments are beginning to look at protecting their networks by moving to a Security as a Service model versus taking on the task themselves. Similar to the rationale behind software as a service (SaaS),…

pexels the coach space 2977565

Are You Complacent or Productively Paranoid?

Are You Complacent or Productively Paranoid? During the conferences and tradeshows where we’ve exhibited over the years, we meet many IT professionals from a variety of companies and industries. We find that many IT professionals fall into one of two…

pexels funny foxy pride 6484594

When Penetration Testing creates “Bad Optics”

Recently, we’ve been seeing a steady number of RFPs for Cyber Security solutions roll in that not only request items such as email security, firewall and end point protection but they also want penetration testing included with the solution. When…

sign here

Acceptance of Risk – Please Sign Here

So, I read a post on social media where a gentleman was asking if there was a risk management document out there that could be submitted to application owners, business owners and system admins who after a consultation decide not…

Give us 15 minutes and you'll know if we're right for you.

Scroll to Top