What We Know: SolarWinds Attack (+Lessons To Be Learned) I Compuquip
As the story continues to unfold and we come to understand more about what really occurred at SolarWinds, it goes without ...
Enjoy our content? Get them sent to your inbox!
Maybe Next Time
As the story continues to unfold and we come to understand more about what really occurred at SolarWinds, it goes without ...
D ocker is already popular, and with the explosive growth of Kubernetes, it's not going anywhere anytime soon. When working ...
As we all know, one of the SIEM tool’s primary duties is to maintain a log of all activities going on in your network, ...
Is your firewall dropping allowed traffic unexpectedly, without logging? Does it seem like your firewall is under performing ...
Welcome to 2021, and welcome to another year of new and emerging technologies. Although XDR rose to fame in 2020, we felt the ...
Get in touch with the leading enterprise cybersecurity solutions provider.
Contact Us NowThe Check Point Central Deployment Tool (CDT) is a utility that builds on the subject of my last article, which was about the ...
If you haven’t already heard, secure access service edge (SASE for short) is what Gartner refers to as “the future of cloud ...
With over two years in the books now, Ricardo Panez has been instrumental to our expansions across Compuquip teams. From ...
Long a feature of multitasking operating systems, a daemon is a computer program that runs in the background rather than under ...
As a cybersecurity community, we cannot forget about the human aspect of this profession. Even the most secure systems can be ...
Since joining the Compuquip team in 2015, Abrael has fostered an environment within our services team that has resonated ...
For years now, the thought of migrating to “The Cloud” is one that many organizations shared interest upon yet have never ...
Does your firewall seem like it is always low on memory? Does it get sluggish at times and seem unresponsive or less ...
This blog post will describe the concept of Phishing and how attackers configure deceiving sites to trick users into giving up ...
If you are an organization that uses machine learning (ML), plans to use ML, or works with vendors that use ML, then read on. ...
The COVID-19 pandemic has led to a massive and sudden transition from office-based work to remote working arrangements. ...
A cybersecurity incident is one of the most frightening risks facing an organization, especially one that depends heavily on ...
Cybersecurity companies offer a wide range of services to their customers to prevent the majority of cyberattacks from ...
Companies face a broad range of cybersecurity threats with becoming more dependent on the internet, remote access, and overall ...
Managing access to enterprise networks is a major challenge for today’s organizations. With more and more people working ...
Distributed denial-of-service (DDoS) attacks are one of the oldest and most effective forms of cyberattack companies must ...
Today’s organizations face an extensive and ever-shifting array of security risks when it comes to their network ...
Remote network security is a major priority for today’s organizations as they continue to manage the risks of having so many ...
Sooner or later, no matter how strong your company’s defenses are, someone will manage to compromise your security. No ...
Maintaining a strong cybersecurity posture is more important than ever before as the COVID-19 coronavirus pandemic forces more ...
Today’s organizations depend on their network services more than ever. Over the last decade, those networks have become ...
As organizations struggle to cope with the intense pressures of the COVID-19 outbreak, many of them are finding that their ...
While the public health and economic consequences of COVID-19 continue to dominate the headlines, organizations are beginning ...
The rapid spread of the COVID-19 coronavirus has caught many organizations off guard and forced them to reconsider the way ...
Network security has come a long way from the days of on-premises mainframes locked away in a server room. Today’s ...
Today’s organizations don’t want to be in the dark when it comes to identifying potential risks that threaten their data and ...
Today’s organizations depend heavily upon their IT networks to deliver both products and services. For many of them, their ...
Your IT assets come in all shapes and sizes. From the obvious (computers, routers, and other physical equipment) to intangible ...
When most people think of disaster recovery, they tend to think of big natural disasters, such as fires, floods, or ...
Compuquip Cybersecurity is excited to announce that we’ve partnered with SentinelOne to deliver unparalleled endpoint security ...
There are many kinds of cyber threats that companies have to watch out for. However, one of the biggest such threats—and the ...
Compuquip Cybersecurity works with many different security vendors to provide best-in-class solutions for all of our ...
As the COVID 19 coronavirus pandemic continues to intensify, more and more organizations are encouraging (or even requiring) ...
The early months of 2020 have been defined by the rapid spread of the COVID-19 coronavirus, which first emerged in China’s ...
Cybercriminals are constantly seeking to take advantage of your computer security vulnerabilities. While the goals of these ...
The “cloud” (a term for remote computing resources) has become an inextricable part of modern business. Organizations all over ...
A veteran to his country and to the world of cybersecurity, Abrael Delgado has been a essential part to our Compuquip family ...
If you work in or around enterprise security circles long enough, you may come across the term “GRC.” However, it might not be ...
The “cloud” has become an inseparable part of daily life for both individuals and organizations. Businesses, non-profits, and ...
Every business is under constant threat from a multitude of sources. From the biggest Fortune 500 companies down to the ...
They say that hindsight is 20/20, but when it comes to cybersecurity in 2020, foresight is crucial. With 2019 more than ...
If you’re wondering “what is S/MIME?” after reading the title of this post, don’t worry, you’re not alone. The term S/MIME ...
Firewall security measures are one of the most basic cyber protection tools that organizations of all sizes use to prevent ...
It seems like only yesterday that Ricardo Panez joined the Compuquip team as our Director of Sales. In the short time that he ...
We’ve talked about SIEM solutions a few times in the Compuquip blog. However, a lot of people still have questions about ...
What does a CISO do? A chief information security officer (CISO) is the person in an organization who is responsible for ...
In a lot of the articles that I and the other members of the Compuquip team have posted to the blog, we’ve brought up the term ...
In business cybersecurity, a network endpoint is any electronic asset that is connected to the business’ network and ...
Many companies struggle to fill the CISO role—opting instead to run without a dedicated C-level cybersecurity expert in their ...
There is a seemingly never-ending stream of cyber threats that organizations of all sizes and industries have to face. From ...
Managed security service providers (MSSPs) can be an invaluable resource for businesses that want to maximize their network ...
The security architecture used by your enterprise is the basis of your cybersecurity measures—including the tools, ...
There are many old sayings that highlight the importance of being proactive—such as “a stitch in time saves nine” or “an ounce ...
Email security, like many other forms of network security, is just one part of a complete cybersecurity architecture. However, ...
Cybersecurity is a critical issue for modern businesses of all sizes. Failing to protect your network and data against attacks ...
Modern software applications, operating systems (OSs), and hardware can all be incredibly convenient. However, they are also ...
Threat intelligence is quickly becoming a crucial aspect of proactive cybersecurity strategies. Many organizations use threat ...
One of the major challenges that companies face when trying to secure their sensitive data is finding the right tools for the ...
In a few of my recent posts, I’ve talked a bit about using defense-in-depth strategies featuring network segmentation as a ...
Firewall monitoring and management is one of the many managed security services that Compuquip provides to businesses in all ...
Chances are that you’ve heard of advanced persistent threats (APTs) before. What you might not know is why this type of cyber ...
Malware is an ever-present threat for modern organizations and individuals alike. The antivirus/antimalware industry has ...
There are numerous technical issues that can affect an organization’s network. One particular issue that many organizations ...
Every organization is faced with cyber threats on a daily basis. New malware programs are created all the time as criminals, ...
Phishing attacks are an evergreen cyber threat that companies continually have to contend with. In fact, according to ...
These days, there are countless cyber threats that individuals and organizations alike have to keep an eye out for. Many ...
Unified threat management systems, or UTMs, have become a mainstay of cybersecurity architectures. Using UTM firewall and ...
So, you’ve created a solid set of selection criteria to find the perfect MSSP to meet your business’s needs. However, how can ...
The internet can be an incredibly useful tool for learning new things, ordering products to be delivered, and even making ...
Managed security service providers (MSSPs) help businesses of all sizes to improve their cybersecurity by taking over critical ...
At some point in the last few years, you might have come across the term “spoofing attack” in relation to some cybersecurity ...
There are countless cybersecurity tools that modern businesses need to counter cybersecurity threats. In particular, endpoint ...
Structured query language (SQL) is a type of computer language used for database management and manipulation of data. It’s ...
It’s been over a year since the European Union (EU) implemented its General Data Protection Regulation (GDPR). What is GDPR? ...
In any network security strategy, it’s important to choose the right security controls to protect the organization from ...
Firewalls are one of the most common network security measures used by modern businesses. These tools help to protect ...
Applying strong network segmentation to create a “defense in depth” strategy for your organization can provide many benefits. ...
There are many different firewall types. This can be a bit of a challenge for new organizations that are looking to optimize ...
Every year, cybersecurity experts look at the previous year’s network security mistakes—the ones that resulted in massive data ...
Everybody wants to know that their businesses are as secure as possible from cybersecurity threats. Part of an effective ...
Security education training and awareness (SETA) programs are one of the cornerstones of many companies’ cybersecurity ...
One of the first questions most people have when they’re told about a cybersecurity solution is: “Does it really help my ...
For some businesses, network security compliance requirements can be a major issue. The problem is that not every business ...
Many companies across the U.S. are feeling the “brain drain” of the cybersecurity skills gap. Staffing shortages for ...
Here’s a quick public service announcement from the whole Compuquip team: “You should be more proactive about your network ...
Security devices can take many forms for a business. From network inspection devices (i.e. “firewalls”), to security ...
One of the first things that you should do after discovering a data breach (and investigating it) is to send out data breach ...
Security information and event management (SIEM) software has become a lynchpin for many companies’ cybersecurity strategies ...
Check Point Software Technologies LTD is one of the most reliable and trusted security software providers in the industry. ...
Tufin is a market-leading provider of security policy orchestration solutions that help companies interface their third-party ...
Using a software-defined wide area network (SD-WAN) that uses a virtual overlay to abstract the process of connecting your ...
Effective management of your company’s firewall architecture can mean the difference between having an effective layered ...
Odds are that you’ve heard of Symantec before—the company’s antivirus programs for personal computers is one of the industry’s ...
Security information and event management (SIEM) systems are crucial for helping modern businesses discover and analyze ...
So, you’ve just hired an outsourced network security team to help your company improve its cybersecurity posture and close ...
Being able to provide top-notch cybersecurity services means being able to work with a variety of tools and resources. This is ...
Software-defined wide area network, or SD-WAN, is a term that many people might not be familiar with—even those that are using ...
I want to tell you about the concept of “defense in depth cybersecurity,” wherein an organization sets up multiple layers of ...
The Health Insurance Portability and Accountability Act (HIPAA) is one of the most well-known and relevant regulatory ...
Managed security service providers (MSSPs) can be an invaluable resource for businesses that want to maximize their network ...
Managed security services can provide a significant boost to almost any organization’s cybersecurity posture. Using a managed ...
Mobile devices such as smartphones, tablets, and laptop computers offer an incredible amount of flexibility and convenience ...
When it comes to business operations, cost is always a factor. For example, businesses often focus solely on the cost of ...
Cybersecurity is often taken for granted. People assume that their network security is fine as is—at least, until something ...
Having strong firewalls is a basic requirement of business cybersecurity. To get the most out of their firewalls, ...
It is an unfortunate truth that no business network is completely immune to a data security breach. In fact, network breaches ...
With new cybersecurity breaches making headlines each year, the importance of protecting your business against cyber threats ...
It’s all too easy to fall into bad habits—especially when those habits either make your day a little easier or trick you into ...
The most frequently asked questions that the Compuquip team fields are: “What kinds of managed security services do you ...
Imagine that you’ve just been told that there was a data breach of your organization. How do you react? Do you know what to do ...
Managed security service providers, or MSSPs, are becoming an increasingly common part of modern network security for ...
Odds are that, by now, you’ve heard of the term “phishing” and how it relates to corporate network security. For those of you ...
Firewalls, sometimes called network security devices, are a core component of any enterprise’s cybersecurity strategy. A ...
What’s the first thing you think of when you hear the word “forensics?” Odds are, if you’re like most Americans, the first ...
Everyone makes mistakes. The problem for businesses is that cybersecurity mistakes can often lead to data breaches, service ...
In a perfect world, businesses wouldn’t have to worry about cybersecurity. Instead of worrying about becoming the next ...
Modern technologies such as Wi-Fi networks have created enormous convenience for businesses. The ability to connect computers ...
It is often said that each new year brings more cybersecurity threats than the previous one. So, how is 2019 shaping up so far ...
A managed security service provider, or MSSP, is an entity—usually an organization consisting of many cybersecurity ...
Security information and event management tools, or SIEM tools, are a crucial part of modern network security architectures. ...
To keep up with competitors and the pace of modern consumers, businesses need to continuously expand and upgrade their ...
A network security audit can be a crucial tool for helping organizations enhance their cybersecurity. But, not every business ...
One question that the Compuquip team has had to answer quite a lot in recent years is “what is a service infrastructure, and ...
Ensuring top-class data security is not a simple task for any organization. Being able to choose the right network security ...
Protecting your business’ most sensitive data takes more than just having the right cybersecurity tools—it takes having ...
In an earlier article, I talked about the six building blocks of cybersecurity that every organization should have. One of ...
While different companies may have different cybersecurity needs based on their industry and size, there are a few basic ...
Every year, managed security service providers (MSSPs) like to make projections about trends in cybersecurity threats—in fact, ...
With a new year comes new cybersecurity threats and challenges to overcome. Cybercriminals are constantly looking to exploit ...
Every year, members of the Compuquip Cybersecurity team join more than 50,000 other people for the annual RSA Conference. What ...
The end of the year is fast approaching. However, while many businesses and their employees are getting ready to take a break ...
The end of the year is an excellent time for business leaders to reflect on the events of the past 12 months and to review ...
In other posts in the Compuquip Cybersecurity blog, the importance of applying security patches to software has been ...
There are many holidays that mark the end of the year. For the average person, the holidays are a time for friends, family, ...
Cybersecurity Awareness Month has officially ended, and now seems to be as good a time as any to pause and reflect on the ...
If you read enough blogs about cybersecurity (including some of the ones we’ve posted in the past), odds are that you’ve come ...
A major part of cybersecurity awareness is knowing how to assess your company’s cybersecurity risks. Knowing what your ...
Most business owners, managers, and (especially) IT security teams are well aware that they face a near-constant stream of ...
When looking for a cybersecurity company to partner with, what is the first thing you look for? Is it: The right technology? ...
With Black Friday coming to a close, Cyber Monday begins. But, rather than focusing on shopping for deals on computer software ...
Everyone makes mistakes, sooner or later. However, not every mistake results in a major cybersecurity breach that makes ...
Each year, businesses across America offer special deals for “Black Friday” and “Cyber Monday” to encourage consumers to make ...
Far too many companies follow an almost purely reactionary mindset when it comes to cybersecurity. Of course, reacting to a ...
As Cybersecurity Awareness Month just passed, the team here at Compuquip Cybersecurity thought it would be a good idea to put ...
So, you’ve decided to invest in a threat intelligence tool to help your company keep ahead of emerging cyber threats. The ...
Network security should be a constant concern for businesses of all sizes. When a company’s cybersecurity architecture is weak ...
Every day, companies face countless cyber threats from a variety of sources—and, unfortunately, no company is safe. New data ...
In a few of our previous posts, we’ve talked about “internal IT security threats.” These are the network security threats that ...
So, your business has worked diligently to protect itself from online attackers — setting up early warning systems and ...
Did you know that October is National Cybersecurity Awareness Month (NCSAM)? Well, you do now. Also, according to ...
Here’s a scenario I want you to picture: You’re sitting at your desk, trying to open your company’s financial documents so you ...
Preventing the loss or leakage of data is crucial for any modern business. Today’s customers are accustomed to ...
When it comes to preventing cybersecurity threats from causing damage and disruption to your business, knowledge really is ...
Security Information and Event Management (SIEM) software can be an incredibly powerful tool for maintaining awareness ...
In a previous post, we talked about how strong cybersecurity isn’t a device, but rather a holistic approach to keeping your ...
Modern businesses need to have a strong and robust security architecture framework for protecting their most sensitive and ...
When it comes to network security issues, an ounce of prevention is worth a pound of cure. Waiting for a threat to strike ...
The cybersecurity landscape is constantly shifting and evolving as new cybersecurity threats and security solutions emerge. ...
Every organization faces a number of online threats on a daily basis. Network threat analysis can help organizations detect ...
Check Point Software Technologies LTD is an industry leader in software-based security solutions that conducts extensive ...
One common misconception about enterprise cybersecurity is that simply grabbing the “latest and greatest” security devices ...
Here’s a question many chief information security officers (CISOs) are asked by their boards: “How do we know we’re secure?” ...
The Chief Information Security Officer (CISO) in any organization has to face a massive burden. Keeping your business safe ...
Most businesses get caught up in the latest security buzzwords and simply purchase whatever is the latest technology for their ...
Securing your business’ network against intruders can be a difficult, expensive, and time-consuming process. In fact, as noted ...
IT security is a major ongoing issue for every organization. Each and every year seems to set new records for online ...
Modern businesses are under near-constant threat from a variety of online attackers. From thieves looking to turn a profit, to ...
If you’re part of a business or nonprofit organization, I have a few questions for you that really need answers for right now: ...
A while back, I wrote a post about some of the warning signs that you might need a new cybersecurity solutions partner. Now ...
In a recent post, we discussed the need for businesses to set up a disaster recovery (DR) plan for hurricane season. A solid ...
Over the years, online retail sites (such as Amazon.com) have grown from being small-time businesses to become enormous ...
So, you want to join a company that feels like a family and rewards top-class effort, but don’t have a ton of experience to ...
Data security has become an increasingly important concern for businesses of all sizes over the last couple of decades. Each ...
Here’s a fun fact: According to the National Hurricane Center, “The Atlantic hurricane season runs from June 1st to November ...
The 2018 FIFA Soccer World Cup is being held in Russia June 14 - July 15, and many cybersecurity experts are warning soccer ...
I have a question for you: What are the most important things that you need to do to keep your network safe from attack? Odds ...
As a business, Compuquip Cybersecurity thrives on building strong relationships between itself and its customers. Our team of ...
The Payment Card Industry Data Security Standard (PCI DSS) is the standard that businesses around the world use to protect ...
You may be aware that Compuquip Cybersecurity partners with different security technology providers to give clients the best ...
Compuquip Cybersecurity is proud to announce that Ricardo Panez is joining the team as our Director of Sales! As the Director ...
Data leaks are not only embarrassing, they’re actively dangerous for your business and your customers. Preventing data ...
A while back, I wrote a blog post about how to recover from a security breach. In that post, I detailed the main phases of ...
The Compuquip Cybersecurity team is a group of dedicated and talented professionals who work hard to protect our customers’ ...
Security assessments and audits are a key part of maintaining your company’s “security hygiene.” Running such assessments of ...
Sooner or later, your organization is going to add some new software to its network (or to individual assets on the network). ...
Considering that, according to the Verizon Data Breach Investigation Report, there were more than 53,000 cybersecurity ...
With the implementation date (May 25) for the European Union’s (EU’s) new General Data Protection Regulation (GDPR) right ...
Network security is a major concern for modern businesses. Even without the various regulatory concerns surrounding the ...
It’s May, and the implementation date for the new European Union (EU) General Data Protection Regulation (GDPR) is right ...
The European Union (EU) is getting ready to put a new Regulation into effect called the General Data Protection Regulation ...
Cybersecurity breaches are a constant threat for businesses of all sizes and industries. From those who would try to steal a ...
If you’ve been keeping track of data security regulatory news coming out of the European Union (EU)—or reading some of our ...
When most people hear the word “audit,” their first reflex is to cringe. Usually, it means having some outside team come in to ...
A little while ago, I wrote an article about how to recover from a security breach detailing the basic steps of the process: ...
On May 25, 2018, the European Union’s (EU’s) new General Data Protection Regulation (GDPR) goes into effect, and it will ...
Compuquip
Location
Suite #450
Doral, FL 33166
© 2021 Compuquip Cybersecurity. All Rights Reserved. Privacy Policy.