Cybersecurity

Endpoint Detection and Response: A New Breed of Defense

Meet Lucy. She is affectionate and playful. She likes belly rubs and long walks on wooded trails. Lucy is great with kids. She can play ball for hours. Lucy is adorable and loved by many! But if a stranger breaks a window or makes a threatening move toward her family Lucy will bark, claw, and […]

Read More

Travel Cybersecurity: Tips for a Safe and Secure Vacation

Vacation season is upon us once again! A few minutes spent in consideration of travel cybersecurity can ensure that your trip is memorable for all the right reasons and none of the wrong ones. Before You Leave Check your company’s policies on leisure travel. This is a good time to review your employee handbook or […]

Read More

Technology Solutions for the Hybrid Workforce Webinar Now Available Streaming on Demand

On June 17th, EXP technical hosted a webinar entitled "Technology Solutions for the Hybrid Workforce." The content of this webinar is now available on demand, in video and a transcript below: Technology Solutions for the Hybrid Workforce Webinar Transcript Introductions KELLY PALETTA: Good afternoon, everyone. My name is Kelly Paletta. I’m director of sales and […]

Read More

Multi-Factor Authentication is Now Mandatory for Cyber Insurance

Multi-Factor Authentication (MFA) is now commonly a minimum requirement for cyber insurance. Stated bluntly: if MFA is not enabled in your computing environment, you are engaging in behavior so risky that insurance carriers will not offer cyber insurance coverage to your business. If you are not familiar with MFA, you might be wondering: What is […]

Read More

Webinar: Technology Solutions for the Hybrid Workforce

Registration for this event is closed. You can now view the webinar streaming on demand accompanied by a text transcript HERE. What is the hybrid workforce?How will on-premises/remote hybrid work shape business operations in the post-pandemic era?What innovations will market leaders employ to attract top-tier talent and outperform the competition? Free Webinar: Technology Solutions for […]

Read More

Top Five Things You Can Do to Protect Your Business Against Ransomware

On Friday, May 7th, a ransomware attack disrupted operations and halted the flow of gasoline, diesel, and jet fuel through Colonial Pipeline. This was the largest cyberattack on an oil infrastructure target in US history. It led to a shutdown of the pipeline carrying 45% of the East Coast's fuel. The disruption inspired panic. It […]

Read More

Cloud to Cloud Backup: Disaster Proof the Cloud!

Cloud to Cloud Backups Summary: "How does Exchange Online backup my email?" You might be under the impression that your data in the cloud is guaranteed by the provider against loss and that lost files or lost email messages can be easily restored. That is not the case. Your data in the cloud could suddenly […]

Read More

On Demand Webinar: Right-sized Solutions for NIST/CMMC Compliance

EXP Technical recently hosted a FREE webinar entitled "Right-sized Solutions for NIST/CMMC Compliance." Among the items covered in the presentation were: "High Value" Items in the NIST SP 800-171 Security Requirements and Journey to CMMC Level 3 Security Operations Center (SOC) as a Service Pragmatic Approach to Security Information and Event Management (SIEM) Roadmap to […]

Read More

What Are the CMMC Levels?

If your business is a subcontractor in the defense industrial base, you have, no doubt, been hearing a lot over the past year about Cybersecurity Maturity Model Certification. Still the definition of each level and  the path to your desired CMMC level may be unclear. This article provides a high-level overview of each of the […]

Read More

What is Controlled Unclassified Information?

  Controlled Unclassified Information, or CUI, is at the heart of Cybersecurity Maturity Model Certification.   How did we get here? An overview of classified information and CUI. The classification of information by the US government exists to secure sensitive information that is not intended for public release. The classification system contains three levels Top […]

Read More