IT Managed Services

A blog for understanding best practices in technology

Entries related to: cybersecurity

Cybersecurity Maturity Model Certification & NIST Compliance

As of December 31, 2017, companies that provide parts and services for suppliers serving the government were required to be compliant with the NIST 800-171 mandate. Starting in 2020, a new certification will be required: Cybersecurity Maturity Model Certification.
Read More

How to Improve Your Firewall Security with a Vulnerability Assessment

Your network firewall serves as the first line of defense between your network and the untrusted Internet. The configuration of the firewall is equally as important as the firewall itself. And since networks evolve over time, you need to check the configuration on a regular basis and make changes as warranted.
Read More

What is a managed firewall?

In the context of Defense in Depth, a firewall is the first step to creating a secure IT environment. A firewall is used to block traffic coming into your IT network as well as traffic going out. Within the simple security model of PROTECT - DETECT - RESPOND, a firewall protects. A firewall's primary function is to provide protection at the perimeter of your network.
Read More

SIEM vs. Firewall: Why do I need a SIEM if I already have a firewall?

If you are looking for ways to improve your company’s cybersecurity, you have probably considered security information and event management (SIEM) solutions. But you may be feeling overwhelmed by the costs involved and the time commitment in implementation. After all, if you already have a firewall and several other security tools in place within your IT infrastructure, why do you need a SIEM?
Read More

How much do managed IT services cost?

Service plans for your information technology can be as unique as your business. But it can be helpful to understand the factors that impact how much you will pay for IT managed services and what is usually included in common service offerings.
Read More

How can an IT network assessment benefit my business?

We have long recommended an IT network assessment as part of onboarding with new managed IT services clients. This provides a starting baseline of the current network infrastructure. From this, we can develop a strategy that will safeguard the systems used to run the business and ensure that the network supports the goals of the business.
Read More

5 Ways to Protect Your Business from Hackers

Do you worry about security breaches? It seems you can't go more than a week without hearing of a major retailer or large financial institution dealing with a significant cyber attack. If companies with the biggest IT budgets are not immune, what can smaller companies do? Lots.
Read More

Should You Use One IT Provider for Both Managed Services and Security?

With ransomware events and security breaches in the headlines every day, business leaders have come to closely associate technology needs with cybersecurity. Maintaining a secure IT infrastructure for your company has become ever more difficult while at the same time critical to company profits. Creating a secure IT environment goes far beyond firewalls and anti-virus software.
Read More

SIEM Optimization: Tuning Your SIEM

You have signed the contract, installed the cabling, and configured your network devices. Syslogs are streaming into your new SIEM and alerting is operational. Finally, you can stop reviewing thousands of logs each day and move on to something a bit more interesting. (mic drop)
Read More

How to Secure Your Business from Cyber Attack

If you haven't suffered a security breach or ransomware attack recently, you may believe that your IT environment is secure, and you are successfully preventing intruders from getting in. But how do you know? Just because no one is reporting problems does not mean that malicious activity does not already exist in your environment.
Read More

Subscribe to Email Updates