logo
November 29, 2024 | Dirk Schrader

A Comprehensive Look into Password Attacks and How to Stop Them

There are some things you want to keep private such as your bank account number, government ID number, etc. In the digital age, that includes the passwords that protect these accounts because once your account credentials are compromised, cybercriminals can get that information. That is why...
October 30, 2024 | Kent Tuominen

SAML vs OAuth Comparison: Similarities & Differences

SAML (Security Assertion Markup Language) and OAuth (Open Authorization) are two of the most common user authentication and authorization protocols. Both of them help manage identity and access using tokens, but they serve different purposes and operate in different contexts. This blog explains...
October 11, 2024 | Mark Techa

Understanding Common Ports Used in Networks for TCP and UDP Usage

Introduction to Network Ports What is a network port? Think of a port as a virtual gateway that a specific service, process, or application on your computer uses for network communication. Each port is assigned a unique number, allowing different types of traffic to be directed to the...
October 8, 2024 | Dirk Schrader

How to Prevent Cyber Attacks: Strategies and Best Practices

Introduction to Cyber Attack Prevention In today's digitally connected world, any organization with digital assets and internet access is vulnerable to cyberattacks. That reality has become all too pervasive in recent years. While it may not be part of your business plan, protection against...
September 27, 2024 | Mark Techa

What are SMB Ports, Port 139 and Port 445?

Organizations are increasing their use of various solutions to address communication needs across their infrastructure. As file systems are an integral part of collaboration, this article will dive into one of the most widely used protocols necessary for many systems. We will learn more about the...
June 25, 2024 | Kevin Joyce

SMBv3 Vulnerabilities Explained

Workplaces have evolved. While hybrid and remote work existed before COVID-19, these working arrangements became even more prevalent during and after the pandemic. Today, workplaces offer the flexibility for employees to work and access company resources from anywhere worldwide, with the Server...
June 7, 2024 | Tyler Reese

Integrate Identity and Access Management with HIPAA, NIST, GDPR and CCPA in Healthcare

The healthcare sector is a top target of cyber criminals eager to steal sensitive data and extort high ransoms. The key to thwarting costly attacks is to understand that identity is the new security perimeter. By implementing robust identity and access management (IAM), healthcare organizations...
March 1, 2024 | Jonathan Blackwell

Active Directory Ransomware Attacks

Organizations worldwide use Active Directory (AD) as their primary identity service, which makes it a top target for ransomware attacks. This article explains how adversaries exploit Active Directory during ransomware attacks and provides strategies and tools for defending against this modern...
January 30, 2024 | Paul Staz

Three Easy Ways to Maintain Data Security and Compliance in NetSuite

Information is an organization's most valuable asset — and with over 94% of US-based organizations using cloud-based systems, one data breach can have serious consequences for a growing business. Maintaining the integrity and security of your data should be high on your priority list...
January 30, 2024 | Paul Staz

The Importance of Onboarding and Offboarding in NetSuite

Growing organizations are constantly changing — and staff turnover is often a part of that. Unfortunately, when it comes to managing access to enterprise systems, staffing changes can pose critical security risks. Tight, scalable onboarding and offboarding processes are essential to mitigating...
Show more articles
...