Everyone knows the adage “No one is perfect”. Unfortunately for anyone with a computer network, the bad actors who want to infiltrate your system are ready to take full advantage of any mistake they can find. The Cybersecurity and Infrastructure Security Agency (CISA) knows this, as they called out CPG 1.E (Mitigate Known Exploited Vulnerabilities) in […]

Using CPGs in Real Life – Patching

Tech Tidbit – No One Is Exempt From Security
My wife works for a multi-billion dollar hospital network you all will know. Every time she signs into their mandated VPN and MFA solution she curses out, “How annoying it is to have to do this each time to do anything!” I was the only “IT guy” in earshot to hear her frustration.

CSI Webinar: Come learn how Veeam’s next generation backup technology can help you sleep better at night!
It has been reported that when attackers breach your network, they often first go after your backups in an attempt to corrupt them so that you have no option to get your data back but to pay the ransom. I recently saw some statistics that when they gain access to the backups, they are at […]