Blog
Introducing Phish Resistant MFA
Keeping accounts and credentials secure requires on-going development and the implementation of sophisticated techniques. As phishing campaigns continue to grow in frequency and their methods become more advanced, authentication processes must also continue to...
Meraki Marketplace Expanded
In our previous newsletter, we briefly discussed the Meraki Marketplace and how its wide variety of apps integrate seamlessly into the Meraki platform, providing customized solutions for several unique use cases. Today we’ll cover some of these in-depth to show just...
Business Continuity Planning with Managed Services: A Step-By-Step Guide
Business continuity planning (BCP) is devising a strategy to ensure that your business can maintain operations in the face of disruptions, whether from natural disasters or cyberattacks. Managed services providers (MSPs) can be invaluable in aiding companies with...
Cisco Spaces & Meraki IoT
Workplaces around the world are seeing technology play a key role in their transformation, supporting hybrid environments using real-time data and monitoring. At most Cisco offices for example, employees and visitors will see digital signage at the entrance that...
The Importance of Penetration Testing
There’s no denying that most businesses have embraced digital practices now, and cybersecurity for businesses is more important than ever. The last thing any business wants is for outsiders to get data from their business. Even with cybersecurity meeting current...
Security Fundamentals – Smart Social Media Use
Social engineering is a manipulation technique used by cybercriminals to trick you into taking a specific action or divulging confidential information without thinking. We’ve previously covered tips on how to spot phishing emails in the workplace by identifying some...