<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

BLOG

vshape_NewWhite

Infogressive Blog

Combining the Power of NGAV and EDR

Traditional antivirus simply isn’t enough to fight the advanced, targeted attacks being deployed today.

How do you fight back? What solutions do you need to prevent the dramatic loss that can rampage through your company?

It’s time to fight back with the next generation of antivirus technology.

 

Posted on April 09, 2019

WHITEBOARD WEDNESDAY: Flat vs Segmented Networks

The fact is, there’s a right way and wrong way to deploy a firewall in a network. Positioning your firewall correctly could make all the difference if a malicious actor were to obtain access to a workstation in your environment.

Follow along in this week’s Whiteboard Wednesday video as our CEO, Justin Kallhoff, discusses the differences between a flat and segmented network. 

Posted on July 12, 2017

Pros and Cons of SSL Encryption

People familiar with Hypertext Transfer Protocol Security (HTTPS) know it protects online activities and communications by applying Secure Sockets Layer (SSL) encryption to web traffic. This is a benefit to organizations that need to shield private data from exposure. And what organization doesn’t?

Posted on January 18, 2017

The One Thing All Secure Networks Should Have in Common

The days of dividing your firewall up into three primary zones, inside, outside and DMZ are fast coming to an end. Security standards such as PCI-DSS, HIPAA, NIST and a host of others all suggest the use of segmentation in order to protect critical systems.

Posted on May 23, 2016

Ransomware Costs Hollywood Presbyterian Medical Center $3 Million

Infogressive’s Jeff Murphy provides feedback from SC Magazine’s article “Ransomware goes to Hollywood medical centre.”

For Hollywood Presbyterian Medical Center to have paid out over three million dollars in ransomware and suffered a week of down time indicates a less than stellar cyber security posture. 

Posted on February 17, 2016

Prepare for the Hunt: Five Practical Tips to Make Log Analysis Less Miserable with Fortinet

Log analysis. It’s a thing. First reactions are probably going to be “Yuck,” “Make the new guy do it,” “Insert expletive here,” or the more common “Why? What broke now?”

Posted on January 13, 2016

TOP ARTICLES:

QUESTIONS?