Posted by & filed under Security.

“You are only as strong as your end user,” Jon Borgesen, Senior Account Executive of Brite noted during the first ThinkBrite CyberSecurity Roundtable, an open forum to discuss the IT security concerns and protection tactics. This month’s topics included: building a security culture and siloed products vs. integrated security practices. The group really felt the… Read more »

Posted by & filed under Security.

We’re living in a world that constantly clashes between “traditional” methods versus “new age” methods. And it doesn’t matter what the subject is, but there’s almost always the way things were done and the way things are being done. In our last blog, we talked about Who’s Responsibility is Security? Our conclusion? It’s a team… Read more »

Posted by & filed under Security.

A study by Symantec found that 65 percent of Internet users have been victimized by cybercrime. Look to your right. Look to your left. There’s a good chance that both of those people have been hacked at some point in their career. Ultimately, employees are easy to please: They want to come to work, do… Read more »

Posted by & filed under Security.

Privileged users are worth protecting, hopefully we’ve made that clear during our past few blogs.  But how can your company do it? What tools are out there? Before we dive to far into, let us make something clear: This isn’t a sales pitch. Instead, we’d like to share with you an industry insight that will… Read more »

Posted by & filed under Security.

How a MSPs Can Help Protect Your Business Many small and medium businesses are living under the belief that cyber criminals target large enterprises. Of course, some of the biggest cyber-attacks that have swarmed media streams are massive data breaches that involve large chain stores, like Target and Home Depot. The truth is, SMBs are… Read more »

Posted by & filed under Managed Services.

The Perks of Managed Services and Hardware Refreshes IT is a powerful component in business. For SMBs in particular, IT can be that game-changer that helps their organizations keep pace with competitors. It drives profits, empowers organizations, and connects workforces, but it can also lead to major financial losses if not maintained, managed and utilized… Read more »

Posted by & filed under Security.

Privileged user. You’ve heard the term before, especially if you read our latest blog about the security dangers that relate to it. In this blog post we’d like to discuss what a privileged user is in more detail. What makes the privileged user unique? This person is someone who has access to critical databases, infrastructure,… Read more »

Posted by & filed under Security.

In our next series of blog posts, we’ll be diving into the privileged user. The good, the bad and the ugly will all be discussed over the coming weeks. Today, we dive into the security dangers of privileged user access. What’s the scariest part? Spotting the anomaly is not always easy to do. When monitoring… Read more »