1. Why Your Small Business Should Begin to Think In Terms of Endpoints

    Operating a small or medium-size business in the 21st century comes with a ton of helpful technology, apps, and devices that keep you connected, allow you to do your job, and streamline or automate your work. However, those apps, devices, and machines also bring with them an inherent risk of being compromised, and a severe enough threat could even bring your business to a halt or let sensitive dat…Read More

  2. Virus Definitions vs. Machine Learning: Why Cylance protects you better

    In the old days, antivirus software was that clunky, memory-hogging thing that constantly needed to connect to the internet to download virus definitions. Virus definitions are like a library of known threats and malicious files, and if you didn’t have the latest virus definitions, you weren’t protected from the most recent threats. The Problem The problem with virus definitions is not necessa…Read More

  3. Virtual Chief Information Security Officer (vCISO)

    The Chief Information Security Officer plays the key role in managing and setting the goals for Information Security initiatives for our clients. This role will require regular interaction with technical and business resources across the enterprise and throughout the overall IT organization. The ideal candidate is a committed, creative, and self-motivated technologist who is interested in practici…Read More