Blogs

How to Prevent Security Breaches from Third-Party Apps

How to Prevent Security Breaches from Third-Party Apps

Prevent security breaches from third-party apps Are we too trusting? Earlier this year, Security Magazine referenced a study revealing that 82% of companies allow third-party app vendors access to all their cloud data; 76% of companies give third-party app partners...

read more
Value-Added Reselling, It’s What We Do

Value-Added Reselling, It’s What We Do

At the moment the world is abuzz, if you will pardon the pun, with COVID-19 and now the next threat in what seems like a monkey paw year, Murder Hornets. But with these seemingly apocalyptic natural occurrences, where does that leave infosec? What are we doing? How...

read more
Password Rumble

Password Rumble

Passwords- the dark necessity of the world, the prize of many bad actors, the security measure that drives users and security professionals alike insane. Special characters, 16 characters, 8 characters, use a passphrase, don’t use a passphrase they are easily...

read more
New Year, New Threats

New Year, New Threats

With the New Year well underway the biggest threats to cyber-security have already begun to rear their ugly heads. When combined with the cybersecurity skill shortages and the growth of development that occurs every day, 2020 is going to be in truth like every other...

read more