Since their creation 1994, SSL (Secure Sockets Layer) certificates have been required for websites that share confidential information. They work by encrypting all the traffic between your web browser and a website, making it harder for someone to track what you are looking at from your workstation.
There is a direct connection between your company’s security and productivity. How? The more technology downtime you experience, the less time you have to get your work done, and the less available you are to your clients and customers. But here’s the good news: with […]
In November 2018 our VP of Business Solutions – Pat Cooke presented a webinar on Right-Sized IT Security
& Compliance. This is now recorded and available to view below:
George Carlin once said, “Electricity is really just organized lightning.” Well, what happens when that lightning gets chaotic? Or unpredictable? Or worse, just up and disappears?
If you have any form of electronics at the heart of your IT infrastructure (spoiler alert: you do) then you […]
There was a time when strong passwords were good enough to protect your information. More recent wisdom recommends we use passphrases, which are longer and much harder to crack.
Today, as phishing attempts get more sophisticated, you must adapt accordingly because passwords alone don’t cut it […]
“Imagine a typical Seattle weather day (excluding July and August maybe). You’re heading out for a mixed day of fun and errands that may include visiting the local farmers market, taking the dog for a walk, making a trip to a taco truck, and maybe a hike around Discovery Park. You’ll do some walking, some driving and move between indoors and outdoors. How do you dress for this multi-faceted excursion? Layers. The answer is always layers.”
EXP will host a free webinar on Thursday November 8th.
FREE ONE HOUR SECURITY CONSULTATION FOR ALL ATTENDEES!
FREE DRAWING FOR AN AMAZON ECHO!
The most vital aspects or your overall IT
Security Plan, including how to effectively AND efficiently secure
Learn from the EXPerts on how to stay
“The typical computer network usually has a closet full of skeletons. Now, there could be more than one closet in any organization, but here I speak of the IT closet, and its name is convenience. It is filled with seemingly harmless security compromises designed to make work more enjoyable, and in the short term, more productive. Filling this closet usually occurs slowly over time, not overnight, and the effects can have serious consequences.”
Pat Cooke, EXP VP of Business Solutions delivered a webinar on cloud technologies in AEC firms on May 31st 2018. Click below to watch a recording.
At EXP, we strongly believe in the web of protection that must exist to properly guard institutions and their data from these threats. This web is comprised of several things. Many of these are technological tools that keep threats from ever entering your environment, let alone being executed within it. Unfortunately, all the gates, checkpoints and filters cannot prevent human error\action – frequently the last stop on the cyberthreat train. Humans must be informed users of technology for our web of protection to remain whole.