by Brian Egenrieder | Jan 15, 2021 | Blog
Zero Trust. This security architecture concept, and naming mechanism, originated in 2010. It was introduced by a principal analyst at Forrester, John Kindervag. The following definition of Zero Trust, published by CSO, summarizes it as: “…a security concept...
by Brian Egenrieder | Jan 12, 2021 | Blog, BYOD Security, Mobile Device Management
As companies embrace the new year, it’s imperative to make securing mobile devices used for business purposes a top priority. Whether your company provides employees with devices or has a BYOD policy, there are too many operating system vulnerabilities (both on...
by Brian Egenrieder | Dec 2, 2020 | Blog
By: Clay Miller, CTO, SyncDog Since working from home is the new norm for many across the world, it’s important to understand network security basics. Internet service providers (ISPs), love or hate them, are responsible for providing the infrastructure for...
by Brian Egenrieder | Nov 5, 2020 | Blog, Mobile Device Management
Whether you’re a small business with a handful of employees or a Fortune 500 enterprise, chances are your staff uses mobile devices for business — company-issued, personal, or both. Either way, managing the devices is important for administrative reasons. So,...
by Brian Egenrieder | Nov 2, 2020 | Blog
Corporate security teams are responsible for an expanding attack surface due to increased flexibility in where employees work from. Most organizations that primarily employ knowledge workers, traditionally operated out of corporate offices prior to the onset of the...
by Brian Egenrieder | Sep 25, 2020 | Blog
Cybersecurity is often not a topic of concern for the average person, but we believe it should be. In honor of National Cybersecurity Awareness Month (NCSAM), an initiative jointly led by Cybersecurity and Infrastructure Security Agency (CISA) and the National Cyber...