Last updated September 27, 2022 Summary: DNS stands for Domain Name System. Think of it like a phonebook for the internet: it matches the links you type in or click with the corresponding URL of the...
Risk Mitigation & Prevention Posts
IT Security vs Compliance: What Are Their Differences?
Last updated September 27, 2022 Summary: IT security can help businesses with satisfying compliance requirements, but the two are not the same. Just because your business is in compliance with IT...
Cryptojacking: Because Every Currency Needs to Be Protected
Up until a few years ago one of the biggest security threats on the internet was ransomware. Everyone had a horror story about someone’s computer getting infected and having to pay huge sums of...
Proximity Tracing & You: What to Expect as the World Returns to Work
COVID-19 has had a profound effect on our society, affecting our health, our work, and our overall well-being. Proximity tracing aims to help track the spread of this virus and use this information...
Latest Posts

Fortinet NGFWs: What is a Next-Generation Firewall?
Firewalls have been a mainstay in the world of cybersecurity for the past few decades, and for good reason. They monitor and control network traffic based on predetermined security rules, acting as a barrier between internal and external networks. Over this time, they...

Managed Infrastructure Services – What Are They?
Proper management of our IT infrastructure components is a necessary organizational defense tactic for doing business in the twenty first century. Most of our networks have moved online, and vast swaths of our workforce have moved remote, meaning hackers and other bad...

What is Vulnerability Scanning?
Securing our networks is an essential part of navigating the twenty first century business climate, and integral to a strong security posture is vulnerability scanning. Vulnerability scanning, sometimes referred to as a vulnerability assessment, is the process of...