Security Wakanda-Style

By |2020-11-23T09:08:50-05:00November 23rd, 2020|

Sometimes security management reminds me of Marvel Studios’ Avengers: Infinity War. The purpose of security management is to ensure the safety of the staff within the organization. In the film, the titular characters attempt to protect the infinity stones from the villain, Thanos. The Avengers had to employ different methods of security to protect [...]

Basic Level of Security

By |2020-11-23T08:34:35-05:00November 23rd, 2020|

I think it’s fair to say that one cannot be an expert of everything – we just don’t have enough time.  However, it can be useful to learn the beginner levels of things that are useful to you. Do your own research, take classes, listen to others, and learn from experiences. I’m not an [...]

Prioritize Cybersecurity Before It’s Too Late

By |2020-11-09T15:02:02-05:00November 9th, 2020|

Data is the lifeblood of any business or organization, therefore protecting it should be any company’s highest priority. Understanding how valuable data is and how it can be leveraged against an organization is often something that isn't thought about actively and therefore, it is not always prioritized properly.  Compromised data can cost millions of [...]

Cybersecurity Understanding is Crucial for Sensitive Information

By |2020-10-21T08:20:31-04:00October 21st, 2020|

Keeping sensitive data and information secure is crucial for our clients, especially those who deal with personal health information. This type of information leaking into the wrong hands is not only dangerously wrong but will likely result in monumental financial and legal repercussions. That’s not to mention the amount of stress that would be [...]

Thar She Blows: Beware of Whaling

By |2020-10-21T10:24:18-04:00October 16th, 2020|

My wife works for a non-profit company so seldom does her work and mine cross paths, but whaling and security management brought us together.  “Whale phishing” or “whaling” is a variation of “spear phishing.”  A scammer sends fraudulent emails ostensibly from a known or trusted sender in order to get [...]

How to Build a Security-focused Culture

By |2020-10-16T15:36:43-04:00October 16th, 2020|

Information security is critical for any organization but building an environment in which employees are aware of potential vulnerabilities and proactively work to prevent breaches can be challenging. Incorporating a strong security focus into your corporate culture emphasizes the importance of information security practices to your team members and empowers your employees to incorporate [...]

Home Network Setup Tips

By |2020-08-18T13:15:40-04:00August 18th, 2020|

With many of us still working from home, it’s incredibly important to ensure that your home network is secure. Confidential information can be easily accessed if your hardware and software aren’t up-to-date and configured correctly.  We’ve proposed some home network tips and recommendations on a variety of topics, including: Router administrative consoles Network security [...]

Safeguard Your Organization with Security Management [Infographic]

By |2020-09-10T12:06:39-04:00June 11th, 2020|

Without solid security, an organization leaves itself exposed to any number of risks to itself, its team members, and its clients. That means that not only would the leadership in the organization be held accountable if security is compromised, but the reputation of the company could be permanently damaged. netlogx wants [...]

How to Refine Your Zoom Settings to Secure Meetings

By |2021-01-27T17:22:09-05:00May 21st, 2020|   Live video conferencing meetings using the Zoom platform are a reality for many organizations. They’re convenient for geographically dispersed team members and clients and you still get the advantage of seeing people’s facial expressions and body language. But if you aren’t careful you could expose your client’s or company’s data to hackers.  We [...]

Go to Top