Main menu

network security

Cybersecurity Techniques: Reactive vs. Proactive

Think of proactive and reactive cybersecurity methods as before and after. Reactive strategies should be a component of your defense against hackers, while proactive strategies should form the foundation of your cybersecurity. Both are critical to your company’s defense.

End of Support for Windows 7 & Server 2008/R2 - Now What?


Microsoft has officially ended support for Windows 7 and Server 2008 as of this week, with no further security updates or fixes to come. Now what?

Test Your Password Strength

As you read about major accounts getting hacked on an almost monthly basis, do you find yourself wondering how strong your passwords are? Check out these two sites that test for password strength:

Is Your MFP Secure, and Why Should You Care?

Your office copier has been more than ‘just a printer’ for quite a while now. How do you know if your printer or copier is secure?

Navigating the Internet of Things: Convenience vs. Risk

The Internet of Things (IoT) offers a lot of convenience. But the more things that you have connected as smart devices, the less likely you are to be vigilant about proper security procedures. Is the convenience worth the risk?