Securing passwords doesn’t have to be difficult. In fact, complicated passwords may be LESS secure since computer users will tend to write them down in accessible places. Instead, use longer passwords or phase-phrases, AND enable 2-factor authentication wherever possible. Many financial institutions now REQUIRE 2-factor authentication (also called 2-step verification). Contact Randy Burgoyne at Proactive […]
How to use Secure Passwords – Lesson One
Securing passwords doesn’t have to be difficult. In fact, complicated passwords may be LESS secure since computer users will tend to write them down in accessible places. Instead, use longer passwords or phase-phrases, AND enable 2-factor authentication wherever possible. Many financial institutions now REQUIRE 2-factor authentication (also called 2-step verification). Contact Randy Burgoyne at Proactive […]
6 Steps for Building a Cybersecurity Culture
Why aren’t your cybersecurity strategies working? Your network security systems aren’t keeping pace with growing threats. Your cybersecurity team is plagued by increasingly frequent, sophisticated and costly threats. Having witnessed industry debacles such as last May’s WannaCry ransomware, the recent Equifax disaster and the 2016 breach in the U.S. Voter Database, C-level executives in all […]
Jive Communications, Inc.
How’s that New Year’s resolution going? Remember your business goals all twelve months with these 5 tips.
Jive Communications, Inc.
Proactive Network Management Corporation shared Jive Communications, Inc.’s post.
5 Prerequisites for Back-to-School Ransomware Protection
As students return to the classroom, so too does the threat of a bad actor holding school data hostage. Be it a public high school or private university, the excitement of a new school year comes with the threat of ransomware. The education sector is now a top target of cyber thieves looking for a […]
How Vulnerable Are You To Ransomware?
Security analysts predict an increase in both the number and size of cyber attacks in 2017. Based on the sheer scale of the recent WannaCry attacks (200,000 systems across 150 countries), testing systems for vulnerabilities is no longer a hypothetical. It’s a must. So is testing employees’ mastery of cybersecurity lessons learned from cyber threat […]
Data Breach Security | Utah Specialists
Data Breach Security | Utah What should I do if my Utah-based company and our business has been victimized by a Cyber attack? It is important to take quick action to determine damage and restore data along with your customer’s confidence. Nothing can ruin a company’s good reputation faster than a breach or compromise of […]
Ransomware
What is Ransomware? In very simple terms it is an email that looks official but if you click on the attachment you are loading a program that can lock important files. To get the files back a ransom is demanded. By the way do not pay until you have spoken to us or someone with […]
IT Compliance Challenges
Compliance is a hot issue in IT, and for good reason. Failure to meet the rules and guidelines of the compliance police could mean fines, steep penalties and most important is a loss of trust with your clients/customers. PCI Compliance – Protect your card Compliance is needed in many areas of business large and small. […]
Cyber Security and Machine Learning
Machine learning has come of age in the Cyber Security world. A new company named Darktrace is now using this method to fight cybercrime. The analogy of the human immune system is used. Just like your body’s defense system notifies you when something is wrong, Darktrace can notify your network when a problem is brewing. […]
Security and Pen Testing
Pen Testing | Utah Security Issues Pen testing is an effective way to discover vulnerabilities in your system. If you are not aware of your vulnerabilities then this is a good first step. Pen or Penetration Testing Trends Pen testing involves several steps to be effective: 1. Invite a hacker to gain access to your […]
Information Security Begins With Education
I’ve spent a lot of time over my career talking about education. K12, higher ed, virtual and blended learning, educational technology, you name it. I’ve even looked extensively at continuing education and professional development. As my focus has turned more to enterprise technologies and security over the last several years, I still couldn’t help but […]
How to improve your Technology Disaster Recovery Plan
Over the past few years we have had many types of disasters (such as hurricanes, blizzards, tornados, floods, fires, and terrorist attacks). With all of these situations, the Government has struggled to continue to serve its citizens because of the lack of a good COOP and technology recovery plan. Every government agency should have a […]
Do All These Data Breaches Call for a New Approach?
In the wake of highly publicized cyber exploits, such as the Anthem data breach, there are always security experts weighing in. And regardless of the nature of the breach, they all seem to echo the same message, “current signatureless malware detection is not good enough”. Clearly, this is true – in fact, our preventive technologies […]
10 obscure, highly specialized browsers that will make you forget about Chrome, Firefox, and IE
Give the Big Three browsers the boot When it comes to web browsing, most Windows users are concerned with only three choices: Firefox, Google Chrome, and Internet Explorer. You’ll occasionally run into someone running Opera, too. But those aren’t the only options—far from it! There’s a wide world of alternative browsers out there, all fighting […]
Unified wired/wireless is great, but with SDN it’s amazing
Unifying your wired and wireless networks is a smart move, with all kinds of great returns. By treating the network as a whole, you can greatly improve your users’ experience and provide wireless users with an experience on par with what they get while on a wired network. You can minimize complexity and streamline network […]
New Obama cybersecurity agency has lessons for us all
With great fanfare, U.S. President Barack Obama launched a new cybersecurity agency that aims to pull together security information from other agencies to gain a better overview of the overall threat and find new ways to fight it. The new Cyber Threat Intelligence Integration Center will alert other areas of government of new threats and […]
Salt Palace Convention Center leverages Meru Networks WLAN to Deliver Uninterrupted Internet Access to More Than 4,500 Simultaneous Devices
Meru Networks, a leader in intelligent networking and the only wireless LAN vendor to have received OpenFlow™ conformance, today announced that the Salt Palace Convention Center in Salt Lake City, Utah has deployed an extensive Meru Wi-Fi network to address high densities of mobile devices used in the 679,000 square foot facility. The network includes […]
10 simple considerations for successful video conferencing – Ten things you gain with Pexip Infinity
There are many reasons to consider Pexip Infinity, and even more good arguments to deploy it and instantly solve video conferencing and UC&C challenges you have. Here are 10 great arguments to consider – in no particular order. Which one is your favorite? Tweet #PexipFavorite 1. Speed of deployment You can deploy Pexip Infinity in a matter of minutes. Not […]