two-factor authentication

Free Webinar: Collaborating Remotely and Safely In A Changed IT World

EXP Technical will host a FREE webinar on Thursday, September 10th 2020. FREE ONE HOUR SECURITY CONSULTATION FOR ALL ATTENDEES! FREE DRAWING FOR A MICROSOFT SURFACE FOR ONE LUCKY WINNER! Pat Cooke, CISSP  and Principal at EXP will host a free webinar on  Thursday, September 10th 2020 at 12:00pm PST. Please see webinar overview below: […]

Read More

Protecting Your Email Identity

How skeptical are you when you get an email, purporting to be from your boss, asking you to buy gift cards for the staff? How do you weigh the subtle red flags contained in that email versus wanting to just do your job?

Read More

SIM Swaps: What You Need to Know

For many of us, our mobile devices hold as much or more, sensitive data than our workstations or desktops. So why should adequate security on our phones be any different?

Read More

Creating and Enforcing IT Security Policies

Though writing and enforcing policies and procedures is probably nobody’s favorite area of IT operations, it’s still a vital part of your business. While creating and following set policies is mandatory for government contractors and HIPAA covered entities, EXP takes it a step further. We recommend all companies and organizations maintain and enforce a basic package of policies and procedures that includes the following points...

Read More

Webinar Recording: Right-Sized IT Security & Compliance

In November 2018 our VP of Business Solutions - Pat Cooke presented a webinar on Right-Sized IT Security & Compliance.  This is now recorded and available to view below: 

Read More

Passwords Alone are Not Enough Anymore

There was a time when strong passwords were good enough to protect your information. More recent wisdom recommends we use passphrases, which are longer and much harder to crack. Today, as phishing attempts get more sophisticated, you must adapt accordingly because passwords alone don’t cut it anymore. There’s even a name for these types of […]

Read More

Creating a Layered Security Approach

"Imagine a typical Seattle weather day (excluding July and August maybe). You’re heading out for a mixed day of fun and errands that may include visiting the local farmers market, taking the dog for a walk, making a trip to a taco truck, and maybe a hike around Discovery Park. You’ll do some walking, some driving and move between indoors and outdoors. How do you dress for this multi-faceted excursion? Layers. The answer is always layers."

Read More

Free Webinar: Right Sized IT Security & Compliance

EXP will host a free webinar on Thursday November 8th. FREE ONE HOUR SECURITY CONSULTATION FOR ALL ATTENDEES! FREE DRAWING FOR AN AMAZON ECHO! Security The most vital aspects or your overall IT Security Plan, including how to effectively AND efficiently secure your cloud. Compliance Learn from the EXPerts on how to stay compliant in […]

Read More

Office 365 Functionality: Much More than Email Management

The purpose of this article is to  highlight other useful, less familiar applications included with your Office 365 subscription, and to illustrate how they can help your business in a variety of ways.

Read More