Verkada and Exchange Attacks: Could you fall victim, too?
Who is Verkada? What happened? Verkada is an IP camera company. They provide cloud-based software that stores videos taken from their customers’ premises. Recently, they were hacked because a username and password with admin access had been exposed. Someone harvested this, put it on the internet, and took advantage of the credentials. This type of…Read More
Which Security Method is Best: Integrated, Best-of-Breed, or Both?
Initial logic tells us the answer to this question must be best-of-breed! But what does having all the “best of the best” security cost you? I have witnessed data centers filled with point products that don’t work well together and the need for an army of staff to manage their many product complexities. This scenario…Read More
Five Warning Signs You Have Poor Cybersecurity
Download the full guide. Poor cybersecurity is a costly vulnerability for your business. Stolen data and viruses can cause significant financial damage to your business. But cybersecurity does not just mean that your technology is set up properly. Ir requires cooperation from your people. Cybersecurity awareness training should be a top priority for every business.…Read More
Endpoint Management with Microsoft: Benefits and Licensing
Early Days of Endpoint Management Were Clunky and Slow In the earliest phases of Endpoint Management, there was System Management Server (SMS). Writing and pushing “Packages” was like hitching up the wagon and packing a sack lunch to head to town for supplies and vittles. Then came System Center Configuration Manager (SCCM), release date 2007.…Read More