Resources
Information, Innovation, Insight, and Client Success Stories!

Security (10)

2 min read

The one-two punch of user and device trust

Multi-factor authentication (MFA) is a proven method through which to ensure you’re verifying the identity of users who are accessing applications....

Read More

1 min read

It’s time to rethink your password

In 2003, a manager at the National Institute of Standards and Technology (NIST) authored a document on password best practices for businesses,...

Read More

2 min read

Why you should care about HTTPS

One basic internet security habit that everyone should remember is to avoid websites that aren’t secured with the HTTPS protocol. This is as simple...

Read More

1 min read

Boost mobile security with virtualization

Mobile device security is paramount in today’s IT landscape. There are plenty of ways to be sure your employees are accessing data safely away from...

Read More

2 min read

Let's Talk Cloud Backup Best Practices

by Chris McKewon, CEO, Xceptional

Read More

4 min read

Five ways the state of security will evolve in 2019

A few months back, my colleagues made several predictions for technologies in 2019—everything from artificial intelligence (AI) and machine learning...

Read More

2 min read

Why should I use private browsing?

You may think that you’re not online enough to risk your safety, or that you never visit unsafe sites. However, the world wide web is a vast network...

Read More

2 min read

Three Cyber Threat Hunting Myths

In my last cyber threat hunting blog, I defined cyber threat hunting and outlined when and why you should use it. Just to reiterate, cyber threat...

Read More

2 min read

The most pressing data concern in 2019

Around this time every year, I always see an influx of the top trends in technology. It seems like the perennial hot topic is security, with good...

Read More