OUR BLOG

Top 5 Cybersecurity Best Practices

By Caleb Kwong | Nov 1, 2021 |
image of text "cybersecurity awareness month"

October was Cybersecurity Awareness Month. While it’s always important to have good technology habits, it’s now more critical than ever. Cybercrime is on the rise around the world, and nobody wants to be a target. Criminals will try just about anything to gain unauthorized access to accounts and a single breach can leave anyone scrambling to recover. Sadly, cybersecurity best practices are…

Read More

Why You Should Consider Zero Standing Privilege

By Caleb Kwong | Sep 27, 2021 |
pixelized locks in blue

For large companies, one compromised account can endanger an entire network. The solution is a Zero Standing Privilege model.

Read More

Cohesity’s Modern Backup and Recovery Approach

By Caleb Kwong | Aug 23, 2021 |
graphic of files for download

Data is any modern enterprise’s most precious digital resource and, like any other valuable asset, it should be securely accessible at all times. Unfortunately, this valuable resource often becomes a costly and risky liability when mishandled. Data management service providers now face an ever-growing abundance of data fragmentation across different sources, silos, clouds, and software applications. Industry-leading cybersecurity firm Cohesity brings remarkable innovation to data backup, recovery, and fragmentation with their comprehensive solutions DataPlatform and DataProtect. We have…

Read More

Palo Alto’s Cortex XDR Solution

By Caleb Kwong | Jul 20, 2021 |
Savant Logo with laptop and phone in background

Having Extended Detection and Response (XDR) technology can provide holistic visibility so your team is not overwhelmed with alerts and various silos of security programs. Here are the various benefits of this type of cybersecurity technology:

Read More

Network Access Control and Mobile Enterprise

By Caleb Kwong | Jun 30, 2021 |
Savant Logo with laptop and phone in background

Network Access Control (NAC) policies tend to be more robust and flexible than traditional edge-focused control protocols. We have chosen to explore in detail a few key components of Aruba’s award-winning ClearPass NAC platform as it pertains to mobile enterprise.

Read More

The Benefits of Managed Detection and Response Solutions

By Caleb Kwong | May 18, 2021 |
Man looking at network informaiton

Data breaches can lead to numerous business risks, such as system downtime, equipment failure, or even legal consequences. Outsourcing key technical duties to trained industry experts provides organizations an affordable alternative to staffing, training, and maintaining their own internal information technology (IT) departments.

Read More

The Top Threats to the Cloud – Azure & the AWS

By Caleb Kwong | Mar 16, 2021 |
Finger pointing at lock

In these uncertain times, especially with that of COVID-19, many businesses across Corporate America are looking for new alternatives in which to not only protect their digital assets, but also their IT/Network infrastructures.  Because of this, they are now moving entirely to a Cloud-based platform, making use of the juggernauts known as Azure and the…

Read More

The Impacts of Compromised Credentials

By Caleb Kwong | Mar 3, 2021 |
hand with cell phone

Cyberattackers are not interested in finding targets en masse, but rather, they are now interested in selecting just a few and finding their weakest spots.

Read More

The Zero Trust Framework

By Caleb Kwong | Jan 28, 2021 |

Introduction As we see the number of COVID19 cases spike out of control, the concept of the remote workforce is going to be around for a long time to come, most likely even into early 2022.  With this in mind, many businesses are now thoroughly assessing and taking stock of what they can do to…

Read More

The Impacts of Phishing During COVID19

By Caleb Kwong | Oct 20, 2020 |
BEC

Introduction There is no doubt that the COVID19 Pandemic has turned this world upside down, to degrees and proportions that have never seen before.  This is especially true from the standpoint of Cybersecurity.  While the threat landscape has been changing even well before all of this hit, it has exploded into new frontiers that are…

Read More