by Ashur Kanoon | Jan 31, 2023 | Blog
VPNs, or Virtual Private Networks, have been around for quite some time. But in their legacy form, remote access VPNs are not the safest security solution in this post-COVID, work-from-anywhere, hybrid work environment we live in today. There are key differences...
by Ashur Kanoon | Jan 24, 2023 | Blog
The negative effects of checking for user credentials at the beginning of a session and granting hours-long access have surfaced many issues, sometimes leading to major security incidents, for users and organizations alike. Continuously checking is an option but not...
by Ashur Kanoon | Jan 3, 2023 | Blog
As a frequent contributor and daily reader of r/VPN on Reddit, I see a lot of consumer VPN questions for vendors like NordVPN, ExpressVPN, OpenVPN, and Private Internet Access (PIA). Let’s look at a few use cases for these and a few things to consider when looking for...
by Ashur Kanoon | Dec 20, 2022 | Blog, Use cases
Authentication and authorization can and should be based on many factors. Relying solely on a username or group leaves a lot to be desired, especially when thinking about how to continuously layer on checks and balances to increase security. User and Entity Behavior...
by Ashur Kanoon | Dec 15, 2022 | Blog, How-To, Use cases
With Black Friday and Cyber Monday out of the way and the holidays right around the corner, IT folks are preparing to get the usual “new device” calls and helpdesk tickets. With over $9B spent on Black Friday itself, you can pretty much guarantee some of your...
by Ashur Kanoon | Dec 13, 2022 | Blog, Improving Legacy Technology
The more prospects I talk to, the more I hear about the dreaded SaaS downtime. Downtime isn’t just an inconvenience. Organizations count on SaaS vendors to ensure certain levels of uptime, so that the organizations themselves can continue to run their business. So,...
by Ashur Kanoon | Dec 8, 2022 | Blog, How-To, Improving Legacy Technology
Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to a Windows-based computer over a network connection. The user employs RDP client software for this purpose, while the other...
by Ashur Kanoon | Nov 29, 2022 | Blog, How-To
It’s been almost 3 years since the world changed and everyone learned what a pandemic is. Students were told to stay home, and school district IT teams were trying to figure out how to get everyone together so that learning continued. With kids at home, working...
by Ashur Kanoon | Nov 22, 2022 | Blog, Improving Legacy Technology
We can all be thankful for so much of what’s going on this Thanksgiving. Very important things like good health, family and friends, and so much more. We can also be thankful for some of the stuff that we need to use every day to do our jobs and just get by in this...
by Ashur Kanoon | Oct 31, 2022 | Blog, How-To
In this multi-part series, we’ll look at what organizations can do to better improve corporate cybersecurity as part of October’s Cybersecurity Awareness Month. In this blog, our focus is keeping your software up to date. Updating software may seem like an obvious...
by Ashur Kanoon | Oct 27, 2022 | Blog, Improving Legacy Technology, Use cases
Having guidelines and frameworks is important when you’re trying to do something important, correctly the first time. Think building plans for a high-rise and the risks of not getting it right. For organizations and nations, that are always under attack, security is...
by Ashur Kanoon | Oct 25, 2022 | Blog, How-To
In this multi-part series, we’ll look at what organizations can do to better improve corporate cybersecurity as part of October’s Cybersecurity Awareness Month. In this blog, our focus is recognizing and reporting phishing. Phishing (noun) – the fraudulent practice of...