Posts in Security Essentials
User Provisioning

Manually adding, removing, and modifying employee access can be a productivity-killer, especially for businesses like yours that are growing quickly. With user account provisioning procedures, your organization can improve its productivity, security, and team satisfaction. Implementing a user provisioning and deprovisioning process can be a game-changer for startups and small businesses.

Read More
Getting to Know Carbon Black

Your business is growing. With every new client you acquire and every sale you make, you move closer and closer to your goals — but you also have more data to manage. Like so many businesses today, you've made the switch to cloud-based computing to save storage space and boost your organization's efficiency. While all of this growth energizes your entire staff, don't get caught up in the moment just yet. Updated technology brings new threats — is your business prepared to meet its new enemies so you don't become the next victim of a cyberattack?

Read More
Workstation Security Audit Checklist

Whether your employees are using a personal laptop or a company-owned device, workstations are an invaluable and inevitable part of nearly every business operation. But if they aren't secured properly, they can be a huge vulnerability for your company. Developing a robust, comprehensive approach to workstation security is critical, so we've put together a checklist to help. Here are the top five essential components of securing workstations, including desktops, laptops, and tablets.

Read More
How Does Drive Encryption Work?

What would you do if you got a Slack from your CEO saying their computer was stolen? How would you protect the information on that device? Even companies that have every cybersecurity solution in place to protect information from technology-based threats won’t be safe when it comes to physical security. That's why it's essential to secure your systems with tools that keep your data safe in the event of physical threats. With encryption, you can secure your devices by protecting your hard drive from anyone trying to access it without authority.

Read More
Single Sign-On Solutions for Small Businesses 

Every morning at work seems to start off the same. You spend at least 5 minutes logging into every account you’ll need to get your job done. If you want this to go quicker, you might use the same, easy-to-remember password for every account — after all, you want quick and easy access to all your accounts. If you’ve prioritized the security of these accounts, each will be protected with a unique, complex password making the process take even longer (assuming you can remember them all). The most effective and simplest solution to this constant headache is to incorporate single sign-on (SSO) technology into your company’s workflow.

Read More
What Does MFA Stand For?

Multi-factor authentication, or MFA, requires more than one step for users to log in to an account in order to improve security. Rather than just entering your password to log in, you’ll need to perform a second step to confirm your identity. You probably already use some form of MFA with your personal accounts. For example, you have to enter a PIN after swiping your ATM card, and often have to use a text or email verification code when you’re trying to log into an account on a new device.

Read More
Jamf Deployment

Apple products are well-loved in the world of tech startups and in the homes of consumers for many reasons — but enterprise-level administration and security controls are typically not one of them. While Macbooks, iPhones, iPads, and Apple TVs have a wide range of powerful features, Apple doesn't offer a very comprehensive business management solution. That's where Jamf comes in.

Read More
Software Updates and Patches

While you're on your computer or cellphone, you get a notification that you need to install and update and restart your device. What do you do? Probably click "remind me tomorrow," even though you'll probably do the same thing again the next time. Sound familiar? Even though these updates can be annoying and inconveniently timed, they apply crucial security patches to your device to protect your information. It's vital to understand the importance of managing your device through software updates and patches to make sure your device is secure.

Read More