Blog Posts

Avoiding Phishing Emails!

This week we want to talk about avoiding phishing emails. Check your headers! Email headers give the extra information necessary to determine if the sender is who they claim to be. This knowledge can be the fastest way to know if you should click the link they sent...

Cybersecurity Decision Time

According to Cisco's 2015 Annual Security Report, 91% of companies employ an executive with direct responsibility for security, but only 29% of them employ a chief information security officer (CISO). Businesses with CISOs on staff recorded the highest level of...

Encryption

This week we want to talk a little about encryption. Implementing encryption can help keep data protected from the prying eyes of unauthorized parties, both in transit and at rest. Encryption is a hot topic these days, and it's important to note that with as many high...

Password Management

This week we would like to talk about password management. Compromised credentials are one of the biggest factors in lateral movement during a breach. It's important we're thinking about how we protect our passwords. Here are some tips to help you manage your...

The 7-Layer Burrito Mode

Food A common thing that can bring even the most opposite parts of the world together to enjoy and celebrate each other’s wonderful cultures. With that being said, it is only right that the tech world uses food to bring those interested in technology, together to...

Vulnerabilities

So, you think you’re safe. You’ve got a tech guy, he’s your top salesman’s nephew. He does the job, he can plug in ethernet cables and troubleshoot a browser with too many toolbars. He even installed Norton anti-virus on all the company desktops! What he doesn’t about...

Human Intelligence Reigns Supreme

Artificial Intelligence (AI) remains a highly polarizing topic that individuals either support, or reject. As we move into the future, AI is most certainly not going away. However, AI in its current state is highly misunderstood, and its capabilities of overthrowing...

Spectre and Meltdown

The RedLegg team has been fielding calls from clients, friends, and family about these vulnerabilities that have been drawing a lot of attention this week. Known as Meltdown and Spectre, these bugs have been making the rounds and stirring up a fuss in typical fashion....

IT Security Trends for 2018 and beyond

The beginning of every new year provides the opportunity for a fresh start and a new set of things to look forward to. Here are the important trends in cybersecurity as we begin 2018! AI AI will begin to play more of an active role in cybersecurity maintenance. We...