Zero-Trust Security Model

Device Management Devices that access corporate data need to be known, tracked, updated and managed by policy (access by time or day, or ability to copy files). Most infections are due to vulnerabilities that have been known and patched in the last few months. Updates are key. Detection Use telemetry to detect unusual anomalies on […]

The Importance of Building Better Passwords

Good password hygiene is one of the easiest ways for businesses and consumers to protect their accounts from the millions of attacks threatening personal data every day. Unfortunately, many people continue to use and reuse the same simple, easily-guessable passwords that have plagued accounts practically since the inception of digital login credentials. For instance, despite […]