(402) 261-0123

Archives

Learn more news

Archives for Category: Whiteboard Wednesdays

Whiteboard Wednesdays: Major Equifax Breach and What You Can Do

The recent breach reported by Equifax is massive, with more information surfacing all the time. When something like this happens, we hear a lot of questions from concerned individuals, such as: Could this happen to our business or organization? Could this have been prevented? How do I protect myself in case my information was stolen? What exactly happened? Derrick Maste...

Whiteboard Wednesdays: Hackers – Good vs. Bad

When you think of a hacker, do you imagine a hooded villain, secretly prying into the lives of unsuspecting victims? Hackers are criminals, right? They are the brilliant masterminds behind stolen identities, disrupted lives and bankrupted businesses. What about White Hat Hackers? Or Gray Hat Hackers? The world needs hackers who are on our side. Where is the line between ...

Whiteboard Wednesdays: Strong Passwords

Passwords are important, they are the equivalent to your house keys, car keys or even your debit card. Having strong, secure passwords is critical. Think of it this way, if you had to hide your house keys every day when you leave for work, would you hide them in the easiest, most convenient spot so that you can get back into the house as quickly as possible when you get home? Just leave the key...

Whiteboard Wednesdays: New Car vs. AV Software

Think of the last time you purchased a brand new car. What if it didn't work after only one day? You jump in your shiny new ride, fasten your seat belt and turn the ignition ... nothing. The car won't start. You might head back into the dealership (if you can find a ride). "I just bought a brand new car from you and now it won't start!" The dealer shrugs and says "well it worked yesterday di...

Whiteboard Wednesdays: Are You A Target?

When you think about organizations that have experienced a data breach, what are the first ones that come to mind? If you’re like most people, chances are your answers were likely Target, Home Depot, The IRS, Anthem Blue Cross, or any of the other big-name breaches that have occurred in the last few years. While these are the breaches that make headlines and stick out i...

Whiteboard Wednesdays: MSP vs. MSSP

It seems like there’s always a new buzzword or acronym emerging in the IT and Cybersecurity industries. It can be tough to keep up on what they are and what they mean. The differences between a Managed Services Provider (MSP) and a Managed Security Services Provider (MSSP) are sometimes difficult to decipher. At Infogressive, we’re an

Whiteboard Wednesdays: Vulnerability Scanning Authentication

Vulnerability scans are a great way to dive deeper into a network and search for problems that may go otherwise undetected. Many times, however, security professionals are performing scans that are only scratching the surface of what could potentially be uncovered. So how do you know if you’re doing it the right way? Follow along in this week’s Whiteboard Wednesdays video to find the ans...

Whiteboard Wednesdays: Vulnerability Scans vs. Penetration Tests

There is still quite a bit of confusion out there on the differences between a Vulnerability Scan and a Penetration Test. The truth is both services can be successful in keeping you ahead of the hackers, but the trick is knowing which one is right for you and when. Understanding the features and benefits of both Vulnerability Scans and Penetration tests will help you be sure you make the most o...

Whiteboard Wednesdays: The Basics of Keylogger Protection

As a cybersecurity professional, chances are that having a keylogger installed on any of your company’s machines is one of your worst case scenarios. Once a keylogger is installed, nothing is sacred. Passwords, proprietary information, and banking credentials are just a few of the many things that are now known to hackers. So how does this happen and how do you prevent it? Check out this w...

Whiteboard Wednesdays: Flat vs. Segmented Networks

The fact is, there’s a right way and wrong way to deploy a firewall in a network. Positioning your firewall correctly could make all the difference if a malicious actor were to obtain access to a workstation in your environment. Follow along in this week’s Whiteboard Wednesday video as our CEO, Justin Kallhoff, discusses the differences between a flat and segmented network. Having your f...

Whiteboard Wednesdays: What Does A Hacker Look Like?

Infogressive is excited to begin our new Whiteboard Wednesdays series! What is Whiteboard Wednesdays, you ask? Every Wednesday our Security Engineers tackle a new topic in a bite-sized video, with the goal of providing some useful insight into the world of cybersecurity. First up is a question we get asked all the time: What does a hacker look like? We’re not going to giv...