Mar 11, 2022 | Cybersecurity
Aldridge’s CIO, Chad Hiatt, and Mitchell Sowards talk through the cyberthreats facing today’s businesses, how they work, what tools you can use to defend yourself, and building an overall security strategy. Get the slide deck
Jan 18, 2022 | Cybersecurity
The anonymity of the dark web is what makes it dangerous. It allows hackers to roam without surveillance, making it the center for illicit activities. Understanding the dark web, data breaches, how to react if your sensitive data is exposed, and how to protect your...
Jan 10, 2022 | Cybersecurity
Managed Detection and Response (MDR) is a cybersecurity professional service that dedicates a 24/7 team of security specialists, utilizing innovative threat detection and analytics tools to monitor and evaluate the integrity of your endpoints...
Jan 10, 2022 | Cybersecurity
Managed Detection and Response (MDR) and Endpoint Detection and Response (EDR) are commonly thrown-around terms in the cybersecurity space. Although they sound similar, they are pretty different. The simplest way to think about it is that MDR refers to a professional...
Dec 17, 2021 | Cybersecurity
Log4j is a common software utility that’s commonly found on many web services. Its intended use is for logging the health and activity of those web services for administrators, providing insights into the services’ health, performance, and utilization. A vulnerability...
Dec 14, 2021 | Cybersecurity
Over this past week, you may have heard mention in the news about the “Log4j” issue. Log4j refers to a common software utility that’s commonly found on many web services. Its intended use is for logging the health and activity of those web services for administrators,...