operational security

Free Webinar: Collaborating Remotely and Safely In A Changed IT World

EXP Technical will host a FREE webinar on Thursday, September 10th 2020. FREE ONE HOUR SECURITY CONSULTATION FOR ALL ATTENDEES! FREE DRAWING FOR A MICROSOFT SURFACE FOR ONE LUCKY WINNER! Pat Cooke, CISSP  and Principal at EXP will host a free webinar on  Thursday, September 10th 2020 at 12:00pm PST. Please see webinar overview below: […]

Read More

EXP IT Security Program - Reducing the risk without breaking the bank - FREE Recorded Web Seminar

Over the last 2-3 years we have seen an exponential increase in cyber security attacks among our clients. Virtually all businesses in all industries are at risk – it’s not just big business anymore! We have developed a simple program for all our clients to assess their current risk and reduce the risk of falling victim to an attack, while being cognizant of the costs.

Read More

EXP Cyber Security Program - Reducing the risk without breaking the bank

Over the last 2-3 years we have seen an exponential increase in cyber security attacks among our clients. Virtually all businesses in all industries are at risk – it’s not just big business anymore!  We have developed a simple program for all our clients to assess their current risk and reduce the risk of falling victim to an attack, while being cognizant of the costs.  Join us to find out how you can improve your security position without breaking the bank. 

Read More

IT Security Awareness Training — FREE Recorded Web Seminar

Here are three facts all business owners and employees must know:

1. U.S. businesses are the top targets of cyber attacks worldwide;
2. The frequency and ferocity of cyber attacks will continue to rise in 2019;
3. Employees are the weakest link in most businesses’ IT security programs.

To help prevent such an attack on your company, EXP is hosted a Security Awareness Training for business owners and employees.

Read More

Creating and Enforcing IT Security Policies

Though writing and enforcing policies and procedures is probably nobody’s favorite area of IT operations, it’s still a vital part of your business. While creating and following set policies is mandatory for government contractors and HIPAA covered entities, EXP takes it a step further. We recommend all companies and organizations maintain and enforce a basic package of policies and procedures that includes the following points...

Read More

Why Your Website Needs an SSL Certificate

Since their creation 1994, SSL (Secure Sockets Layer) certificates have been required for websites that share confidential information. They work by encrypting all the traffic between your web browser and a website, making it harder for someone to track what you are looking at from your workstation.

Read More

Webinar Recording: Right-Sized IT Security & Compliance

In November 2018 our VP of Business Solutions - Pat Cooke presented a webinar on Right-Sized IT Security & Compliance.  This is now recorded and available to view below: 

Read More

Creating a Layered Security Approach

"Imagine a typical Seattle weather day (excluding July and August maybe). You’re heading out for a mixed day of fun and errands that may include visiting the local farmers market, taking the dog for a walk, making a trip to a taco truck, and maybe a hike around Discovery Park. You’ll do some walking, some driving and move between indoors and outdoors. How do you dress for this multi-faceted excursion? Layers. The answer is always layers."

Read More

Free Webinar: Right Sized IT Security & Compliance

EXP will host a free webinar on Thursday November 8th. FREE ONE HOUR SECURITY CONSULTATION FOR ALL ATTENDEES! FREE DRAWING FOR AN AMAZON ECHO! Security The most vital aspects or your overall IT Security Plan, including how to effectively AND efficiently secure your cloud. Compliance Learn from the EXPerts on how to stay compliant in […]

Read More

Are You Compromising Security for Convenience?

"The typical computer network usually has a closet full of skeletons. Now, there could be more than one closet in any organization, but here I speak of the IT closet, and its name is convenience. It is filled with seemingly harmless security compromises designed to make work more enjoyable, and in the short term, more productive. Filling this closet usually occurs slowly over time, not overnight, and the effects can have serious consequences."

Read More