Your browser is out of date.

You are currently using Internet Explorer 7/8/9, which is not supported by our site. For the best experience, please use one of the latest browsers.

866.430.2595
Request a Consultation
banner

Subscribe to our blog for the latest industry news.

Subscribe
Urgent US-CERT Healthcare Trickbot & Ryuk Alert
Oct 29, 2020 | Dominic Schulte, President

Urgent US-CERT Healthcare Trickbot & Ryuk Alert

The Joint Cybersecurity Advisory, comprised of the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS), published a critical alert of verified and widespread attacks targeting Healthcare and Public Health Sector organizations.

Read More
Beyond Endpoint Technology: Why You Should Leverage Security Experts for MDR
Oct 28, 2020 | Rory Sanchez, Chief Executive Officer

Beyond Endpoint Technology: Why You Should Leverage Security Experts for MDR

You have to see bandwidth not only as a way for all the good stuff to come in, but also as the perfect conduit for the bad stuff. The more stuff you stream, the more devices that get deployed, the larger the attack surface, the better the chances of finding a way in – it only makes sense. Fortunately, when it comes to protecting your newly expanded corporate IT presence, a few things have remained relatively constant. These include 1) that every user has an “endpoint device” or two that they depend on for getting their work done, 2) that endpoint remains the primary target of most attacks, and 3) we’ve become extremely good at protecting those endpoints.

Read More
Scary Stories to Tell in the Dark Server Room - Part II
Oct 22, 2020 | Aaron Moss, Senior Security Consultant

Scary Stories to Tell in the Dark Server Room - Part II

As TRUE’s self-proclaimed, and reigning champion Halloween and Horror Movie Expert – I know scary. REALLY SCARY. What kind of scary stuff do I mean? Like ways to break your internal network – particularly using devices that you may have forgotten about, bypassing your defenses to get your data. Financial records, proprietary information about your latest prototypes, medical or student records, stuff like that.

Read More
Endpoint Protection Requires More Than Tools
Oct 08, 2020 | Scott Williamson, VP of Information Services

Endpoint Protection Requires More Than Tools

If the news is any indicator, 2020 has been beyond challenging for most of us– and we have the memes to prove it. Even if you’re one of the lucky few whose industry hasn’t suffered a massive dip, you’ve probably found yourself working longer hours and experiencing more daily anxiety than in the past. It’s time to ask yourself how and why you set up your remote access. For most, this had to be accomplished quickly and with technology that would minimize latency and provide corporate access to the most possible end users at one time.

Read More
Microsoft Advanced Threat Protection
Sep 17, 2020 | Ray Todich, GN Engineer

Microsoft Advanced Threat Protection

Security has never been a hotter topic in the tech industry than it is in 2020. With the changes wrought…

Read More
Driving User Adoption in Teams
Sep 10, 2020 | Diana Hutcherson, GN Engineer

Driving User Adoption in Teams

So you want to start using Microsoft Teams. More specifically, you want your company (or a company you…

Read More
Preparing Your Organization for Teams
Sep 03, 2020 | James Keiser, Technical Account Manager

Preparing Your Organization for Teams

The 2020 Realities of Working in an Office Working in a physical office these days means not only dealing…

Read More
Microsoft Defender Advanced Threat Protection SSPR
Aug 27, 2020 | Ed Pickens, Global Service Desk Engineer

Microsoft Defender Advanced Threat Protection SSPR

Microsoft Defender ATP Self-Service Password Reset (SSPR), an Azure Active Directory (AD) feature, empowers…

Read More
Lose the Spreadsheets
Aug 17, 2020 | Gary Noto, Sr. Data Analytics & Business Intelligence Engineer

Lose the Spreadsheets

To many it might seem that Governance, Risk, and Compliance is just a matter of writing a few controls…

Read More
A Better Way to Manage Your Software Inventory
Aug 06, 2020 | Gene DeHostos, Technical Account Manager

A Better Way to Manage Your Software Inventory

  As Administrators, we often get confused when it comes to Inventory Management Software in Supply…

Read More

Get Started with True Digital Security

Request a Consultation