What is RMM? Remote monitoring and management (RMM) is a type of IT software that managed service providers (MSPs) use to monitor users’ devices, endpoints, and networks. RMM works through a small footprint called an “agent” that an MSP installs on clients’ devices, such as workstations, servers, and mobile devices. The agents share information about […]
Author: Nikki Pham
Data Trust Strategy
What is a Data Trust Strategy? Most business leaders believe that their organizations are making their data and data usage more trustworthy, though consumers tend to disagree. According to a PwC survey1, 55% of business leaders say that consumers trust them more with their data than they did two years prior, but only 21% of […]
Data Exfiltration
What is Data Exfiltration? A critical function of computer and network security is keeping sensitive data inaccessible to unauthorized entities. Data exfiltration is a cybercrime that poses a serious threat to computer network security. Data exfiltration is a form of illegal leakage of sensitive data from a particular individual or organizational system. Google explains data […]
What are KPIs? Key Performance Indicators (KPIs) are measures of performance. They are commonly used to help an organization track progress towards long-term organizational goals by defining and evaluating performance progress. A McKinsey survey reveals that boards share frustration with top executives due to the lack of effective integrated approaches to cyber risk management and […]
What are the Threats of Ransomware to the Remote Workforce? PwC’s report Cyber Threats 2022 found ransomware incidents in 2022 made ransomware to be a major cybersecurity threat faced by organizations of many sizes and in many sectors. 1 Threat actors were able to circumvent security measures and successfully infect networks, from manufacturing to retail […]
What is VDI? The work landscape has changed dramatically, with employees increasingly working from home and hybrid cloud ecosystems becoming commonplace. As the landscape changes to include more employees working from various locations, on different devices, and within many systems, the challenges of administration and security are growing and changing as well. In order to […]
Business Resilience Planning
What is Business Resilience Planning? Crisis management and business continuity planning is something that your organization may have engaged with quarterly or even annually pre-pandemic, but it is likely to have become significantly more active since then. Before settling back into complacency, thinking that one “black swan” event is all your organization will ever endure- […]
What are Steps to Take for Employee Offboarding? Establishing and following an IT protocol for offboarding employees is a critical, but often overlooked, cybersecurity protection activity. More often than not, an organization cannot predict how/why/when an employee will exit the organization, so having a plan in place that can be applied in any kind of […]
What are IT Security Risks for National Critical Functions? Whether your organization is public or private, it exists within a complex system where it might a greater role and responsibility in national security than you may have realized. The Cybersecurity & Infrastructure Security Agency (CISA) defines National Critical Functions (NCFs) as, “…functions of the government […]
Secure Web Browsers
What are the Features of Secure Web Browsers? As is the case with many tools and utilities that we use in our daily lives, we often continue to use what is comfortable and familiar, without giving much thought to what other innovations may have arrived on the scene over the years. If this is the […]