Goodbye Antivirus, Hello EDR!

Goodbye Antivirus, Hello EDR!

For as long as we can remember, having antivirus (AV) software installed and updated was an important aspect of a healthy cyber security posture.  However as threats have evolved, the tools that thwart attacks must evolve, and this includes antivirus.  Threats are no...
Link Lock Phishing Protection

Link Lock Phishing Protection

91% of cyber attacks begin with a phishing email.  Phishing remains the most common and successful way for hackers to get their foot in the door before infecting an organization with malware.  Often, those phishing emails contain counterfeit links that will lead a...
New zero-day threat – Log4j

New zero-day threat – Log4j

On Friday, a vulnerability called “Log4j” that effects a large variety of consumer and business applications was revealed.  This threat effects a tool that many closed and open-source applications use for logging purposes.  This vulnerability is rated at...
Strengthen Your Human Firewall

Strengthen Your Human Firewall

Changing Landscape of Cyber Security Cyber Security has always been a moving target.  In the past, bad actors would hunt and search for their targets.  Due to the time it took to research, plan, and execute attacks, larger businesses were chosen to maximize the reward...