In 2020, Ryuk Ransomware operators shut down Universal Health Services by exploiting the zerologon vulnerability to gain control of domainRead More

In 2020, Ryuk Ransomware operators shut down Universal Health Services by exploiting the zerologon vulnerability to gain control of domainRead More
Each new endpoint added to a corporate network expands its security perimeter, and since endpoints serve as gateways to aRead More
Endpoint protection, also known as endpoint security, involves the use of advanced security tools and processes to secure various endpointsRead More
A hacker’s goal is to identify weaknesses or vulnerabilities in an organization’s IT infrastructure that they can then exploit forRead More
The migration to a remote workforce hit fast forward in the past year as businesses around the world asked employeesRead More
Keeping software up to date with the latest security patches is essential for businesses in a time when cyberthreats areRead More
Timely deployment of patches is critical for maintaining the security of your IT systems. Through efficient patch management, you canRead More
In our previous blog – Patch Tuesday: October 2020, we briefly discussed Common Vulnerabilities and Exposures (CVE) and how softwareRead More
Passwords are no longer enough to secure logins to all of our software and systems. According to the 2019 VerizonRead More