(402) 261-0123


Learn more news

Archives for Category: Channel Top Resources

MSP vs Hacker: Penetration Test Demo

       We all know that security is hard… for an MSP, it’s even more difficult.
In addition to balancing the everyday security risks that every business faces, MSP’s also have to focus on their customers’ networks. A lot of times, customer networks take precedence and MSP’s in-house security falls short.

This is a message to all MSP’s: it’s time to take security off the...

Vulnerability Management: Don’t Be That Guy

Ignore security at your own and your customers’ peril. Recently there was a post on r/sysadmin from a network administrator who had a client system hacked because he left their iLO card facing the internet… and didn’t stay up to date on vulnerabilities and patching. His lack of situational awareness led to what he initially viewed as a brief operational interruption, but has now come to und...

Don’t Get Hooked! 7 Signs of a Phishing Email

it, but your computer, mobile devices, accounts, and information all have value to cyber criminals. According to Verizon's 2017 Data Breach Report, 91% of company breaches start with an email. Knowing how to maintain email security at the user-level will keep you and your company safe. Here are the top 7 signs of a phishing email to watch out for:

Penetration Test vs. Risk Assessment? Follow Our Flowchart to Find Your Answer

It's not uncommon for the terms ‘Risk Assessment’ and ‘Penetration Test’ to be used interchangeably. The truth is, the two are very different. A risk assessment typically involves
  • Identifying areas of vulnerability or potential weakness
  • Providing a roadmap to a...