
In this blog series, I will be discussing some basic, and not so basic, security practices that you could, and should, be implementing at your business to tighten your security…
IT Resources Blog
In this blog series, I will be discussing some basic, and not so basic, security practices that you could, and should, be implementing at your business to tighten your security…
The Development of Today’s Malware A major challenge of network security is that it’s easier now more than ever to create malware that has never been seen before, thus bypassing…
Early last month we held our Annual Security Conference during which we focused on the meteoric rise of ransomware and zero-day threats. Just days later the WannaCry ransomware made a…
Change in the World of Information Security This year, Cerdant implemented and became a reseller of what we believe is the most effective endpoint security solution in existence. It’s called…
Advanced threats such as zero-day exploits and custom malware are on the rise. Today, cyber criminals exploit holes in vulnerable software affecting organizations of every size. SonicWALL Capture Advanced Threat Protection…
Effective zero-day threat protection is becoming increasingly important to organizations. Businesses need solutions including malware analysis technologies that can detect evasive advanced threats and malware before they enter the network….
Layer Your Security for Best Results Many modern cyber attacks are blended attacks. These attacks target different layers using many techniques to infiltrate a network. Blended attacks can bypass outdated firewalls that…