Category

EDR
cybersecurity worker at computer
After yet another year marked by an excessive amount of high-profile cyber-attacks and data breaches, every company, no matter the size, should now expect to be breached. There is a dangerously unstable balance between the ever-increasing cyber threat and cybersecurity solutions. Increasing threats across industries, and the proliferation of connected endpoints to a myriad of...
Read More
cybersecurity pro with tablet in server room
What do some of the world’s most premier data breaches—Target in 2013, Heartland Payment Systems in 2009, Anthem in 2015—have in common? In these examples (and so many more), the companies had actually met compliance requirements before the breach occurred. Whether it was PCI DSS or HIPAA, one thing became clear in the aftermath—regulatory compliance...
Read More
cybersecurity expert on computer
Why Endpoint Detection and Response (EDR) is Superior to Your Current Antivirus (AV) Tools  Just as our devices—computers, phones, tablets—are basically outdated by the time we exit the store, the same is happening for cyberattack protection. Our technology is continually becoming more sophisticated, and cybercriminals are keeping up. As we mentioned in a previous post,...
Read More