by Jason Rutherford | Aug 30, 2024 | Cyber Security, Manufacturing
Estimated Reading Time: 10 minutesIn manufacturing, keeping your production line running smoothly and safely is the top priority. Your IT team plays an important role in making sure that new technologies like the Internet of Things (IoT) and cloud computing enable...
by Mike Brimberry | Jul 9, 2024 | Cyber Security, Legal Services
Estimated Reading Time: 5 minutesAs a managing partner, principal, or senior IT staff at a law firm, you’re a prime target for cybercriminals. According to the American Bar Association (ABA), “25% of law firms have experienced a data breach at some point”...
by Mike Brimberry | Mar 14, 2023 | Cyber Security
Estimated Reading Time: 4 minutesPhishing is a form of fraud in which an attacker masquerades as a reputable person or company in email or other electronic communication channels. A common phishing tactic is to send an email with a forged return address, so that the...
by Jesse Walter | Dec 9, 2021 | Cyber Security, Endpoint Management
Estimated Reading Time: 3 minutesThis post is a short overview of how you can use Microsoft Defender for Identity to investigate high-alert users in your environment. If your active directory is a little bit spread out, using Microsoft Defender for Identity will allow...
by Jesse Walter | Oct 27, 2021 | Cyber Security, Microsoft Defender
Estimated Reading Time: 4 minutesEvery day security vulnerabilities in apps create risk for potentially exploitable paths that a malicious actor might attempt to use in order to compromise a device in your infrastructure. To prevent this, you can use Microsoft...