Recent Wordpress Vulnerability Hacks Millions of Pages Here's the Lesson

Recent WordPress Vulnerability Hacks 1.5 Million Pages—Here’s the Lesson

POSTED BY ON Fri, Feb 24, 2017

Vulnerabilities within third-party software might be your greatest risk, because you can’t control or influence the code. And once the the fix is out, the cat’s out of the bag. It becomes a “known vulnerability”. Known to the manufacturer/developer, known to its customers and most significantly, known to attackers.

[Webinar Mar 1st] Dude Where’s My Desktop? – Virtual Desktop VDI with Cisco and Citrix

POSTED BY ON Wed, Feb 22, 2017

In today’s work environment, smartphones and tablets are ubiquitous and offer a tremendous opportunity for companies to increase productivity. Yet most employees are limited to using these devices for email and calendaring only.

D-Link Camera

FTC sues D-Link for Gross Lack of Security—Are You Protected?

POSTED BY ON Tue, Feb 7, 2017

The lawsuit comes after major distributed denial of service (DDoS) attack in October last year affected a number of prominent websites and services, driven by […]

[WEBINAR] Exposing the Risks with Transport Layer Security

[WEBINAR] Exposing the Risks with Transport Layer Security Feb. 1, 2 PM ET

POSTED BY ON Thu, Jan 26, 2017

Many organizations and email providers endeavor to reduce risks by sending emails over Transport Layer Security (TLS) believing that TLS protects sensitive and confidential data. […]

Video: How to Recover a System From a Locky Ransomeware Attack

Video: How to Recover a System From a Locky Ransomeware Attack

POSTED BY ON Fri, Jan 13, 2017

It is not a question of “if”, but “when” you’ll suffer an attack. Will you be ready and able to deal with it? Here are some steps you can take.

Here’s How to Save Thousands of Dollars Before the End of 2016

POSTED BY ON Wed, Dec 21, 2016

Realize huge savings before the end of the year with IRS Sec. 179 deduction and Cisco Capital 0% financing! Learn more…

Why Hackers "Farm" and How to Avoid Being Extorted

Why Hackers “Farm” and How to Avoid Being Extorted

POSTED BY ON Fri, Oct 28, 2016

Hacking 101 is much like Sales 101. If you close a deal with a “customer” and have “success”, you’d go back and do more business together, wouldn’t you? You’d “farm” the account because now there is a relationship. And hackers do the same thing

eiQ Networks and UTG

UTG Partners with EiQ Networks To Enhance Managed IT Security Offering

POSTED BY ON Thu, Oct 13, 2016

UTG leverages SOCVue to add hosted SIEM to its managed IT security offering for small to midmarket organizations.

ATLANTA, GA—(UTG – Oct. 13, 2016)—United Technology Group, a regional Managed IT and Security services provider, announces its partnership with EiQ Networks to strengthen its managed cybersecurity protection services.

2016 Presidential Cybersecurity Showdown

2016 Presidential Cybersecurity Showdown

POSTED BY ON Tue, Oct 4, 2016

In the first presidential debate last Monday evening, Hillary Clinton and Donald Trump went toe-to-toe over cybersecurity, among other things. So, who came out on top, and do either of them really grasp the severity of the situation?

First and foremost, being a military veteran and having been exposed to classified information most of my military career, it is unfathomable that someone would transmit classified email on a non-government server.

Email is Still the Number 1 Threat Vector

Email is Still the Number 1 Threat Vector—Just Don’t Click!

POSTED BY ON Mon, Sep 26, 2016

People, not technology will always be the weakest link in an organization.

Email is considered the number one threat vector, but consider this, if no one clicks the email then nothing happens.

This is where people come into play with how an organization addresses security…

12 cloud security threats

12 Cloud Security Threats Infographic—The Dirty Dozen

POSTED BY ON Fri, Sep 16, 2016

Whether you’re a small business or large enterprise, the most immediate concern of keeping your data in the cloud is security—and rightfully so. Cloud deployments are a jackpot for hackers, so naturally, they’re bigger targets. Believe it or not, the cloud service provider doesn’t pose the greatest security risk. The greatest risk is posed by it’s customers’ users.

Best It Services Technology Millennials

Only the Best IT Services, Tools and Technology Will do for Millennials

POSTED BY ON Fri, Sep 9, 2016

As the war for talent increases in intensity, it’s those companies that have the best IT Services, Tools, and Technology who are going to be most attractive to millennial employees. Why is that important?