placeholder pixel image
SIEM vs. EDR

SIEM vs. EDR

Now that we’ve covered Security Incident and Event Management (SIEM) and Endpoint Detection and Response (EDR) in previous videos, you might be wondering which solution is best for your business. In many cases, the answer is both. Using SIEM and EDR together can...
2022 Global Threat Report Update

2022 Global Threat Report Update

The 2022 Global Threat Report from CrowdStrike is now available, providing information on the latest vulnerabilities, security threats, and intrusion methods. The report highlights the increasing risk in three critical areas: endpoints and cloud workloads, identity,...
Identifying Digital Assets

Identifying Digital Assets

As the world becomes increasingly digital, businesses are relying on more and more digital assets to operate. From website content and social media accounts to customer data and company records, digital assets are a vital and valuable part of any company. However,...
Internal Policy for Data Retention

Internal Policy for Data Retention

When your business or organization experiences a breach of security or loss of data, how soon can your business get back up and running? If you are prepared enough to have backups of your data… how recent is that backup? These small details can have a big impact on...
Internal Privacy Policy

Internal Privacy Policy

One of the first things you can do when going into business (and consequently, #1 on our Cybersecurity Essentials Checklist) is to create an internal privacy policy. As the name suggests, the internal privacy policy is a written document to be shared with all...
What is “Least Privilege”?

What is “Least Privilege”?

Every good information security program is based on three essential principles: confidentiality, integrity, and availability. One of the most common-sense security methods an organization can use to fulfill these principles is the concept of “least...
Patch Management Plan 

Patch Management Plan 

Does your business have a patch management plan? If you answered “no” you’re not alone. Most workplaces leave it up to fate, rely on built-in failsafe features (like when your computer automatically turns off and updates), or just let employees...
Privacy PolicyTerms Of ServiceCookie Policy