<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

BLOG

vshape_NewWhite

Infogressive Blog

Cyberattack Roster: What You're Up Against in the Threat Landscape

Cyber criminals have no off season. Here are some of the most popular attack tactics and techniques your organization should be prepared to defend against.

Posted on September 30, 2019

Key Cybersecurity Stats for MSPs

Cybersecurity has become a hot topic for Managed Service Providers (MSPs) and their small business clients. It has become clear that MSPs who don't provide cybersecurity to their clients are falling behind, but the quality of the cybersecurity offerings is also a key factor. 

Posted on June 03, 2019

5 Need-To-Know Cybersecurity Statistics for 2019

Understanding cybersecurity can be complex in today's constantly-evolving threat landscape. With every new advancement in technology comes a new opportunity for hackers, a new avenue for attack, and a new vulnerability to be exploited.

Posted on January 04, 2019

Families are Targets, Too: 5 Home Cybersecurity Tips

It’s not just big businesses that are at risk of being hacked or cyber-attacked.

It may seem scary to let your kids go online after you hear that, but don’t throw all the computers away and live off-the-grid just yet. Try implementing these five cybersecurity practices in your home to give your family some peace-of-mind online:

Posted on October 24, 2018

5 Easy Ways to Improve Your Cybersecurity at Work

 

It’s true, some of the smallest improvements can really be game changers — especially in cybersecurity.

Whether you know it or not, cyber criminals see you, the end user, as an easy target. But don’t worry, you don’t need the newest security technology to protect yourself from some of the most common threats. Follow these easy tips to eliminate many of the everyday security threats...

Posted on October 15, 2018

10 Mistakes that Will Get You Hacked

Sometimes, it's the little things that make a big difference.

This is especially true for cybersecurity. Here are 10 common mistakes made in office settings that leave people vulnerable to cyber attacks, presented by Security Engineer, Will Tipton:

Posted on September 06, 2018

GDPR: Is Your Cybersecurity Strategy Ready?

If the GDPR affects your business, you may need to make some significant changes to your cybersecurity strategy. Here are four core areas to address in order to achieve technical compliance with the GDPR.

 

Posted on May 09, 2018

A Simple Guide to Online Privacy and Protecting Your Identity

It is easier than ever for cyber criminals to obtain your private information, especially when “trustworthy” sites are the ones putting it on the line.

Follow these simple steps to ensure you’re doing what you can to keep your information safe at work and at home:

 

Posted on April 02, 2018

Disaster Averted: Why Log Review is a Vital Part of Cybersecurity

It’s not fun, but it’s necessary. One of our very own Security Analysts recently proved why log review is a crucial step in protecting our customer’s networks.
Posted on October 19, 2017

WHITEBOARD WEDNESDAY: Good vs Bad

When you think of a hacker, do you imagine a hooded villain, secretly prying into the lives of unsuspecting victims? Hackers are criminals, right? They are the brilliant masterminds behind stolen identities, disrupted lives and bankrupted businesses. 

What about White Hat Hackers? Or Gray Hat Hackers? The world needs hackers who are on our side.

Posted on September 06, 2017

WHITEBOARD WEDNESDAY: Traditional vs Advanced Malware Prevention

Think of the last time you purchased a brand new car. What if it didn’t work after only one day? You jump in your shiny new ride, fasten your seat belt and turn the ignition, and … nothing. The car won’t start.

Posted on August 23, 2017

WHITEBOARD WEDNESDAY: Are You A Target?

When you think about organizations that have experienced a data breach, what are the first ones that come to mind? If you’re like most people, chances are your answers were likely Target, Home Depot, The IRS, Anthem Blue Cross, or any of the other big-name breaches that have occurred in the last few years.

Posted on August 16, 2017

WHITEBOARD WEDNESDAY: MSP vs MSSP

It seems like there’s always a new buzzword or acronym emerging in the IT and Cybersecurity industries. It can be tough to keep up on what they are and what they mean. The differences between a Managed Services Provider (MSP) and a Managed Security Services Provider (MSSP) are sometimes difficult to decipher.

Posted on August 09, 2017

WHITEBOARD WEDNESDAY: Vulnerability Scanning Authentication

Vulnerability scans are a great way to dive deeper into a network and search for problems that may go otherwise undetected. Many times, however, security professionals are performing scans that are only scratching the surface of what could potentially be uncovered. 

Posted on August 02, 2017

WHITEBOARD WEDNESDAY: Vulnerability Scans vs Penetration Tests

There is still quite a bit of confusion out there on the differences between a Vulnerability Scan and a Penetration Test. The truth is both services can be successful in keeping you ahead of the hackers, but the trick is knowing which one is right for you and when.

Posted on July 26, 2017

TOP ARTICLES:

QUESTIONS?