Ransomware: expert prevention and mitigation advice Ask anyone who’s been through it: ransomware attacks are nasty, insidious beasts that can spike stress levels, lean hard on … Read More
Want to outsource your IT security? 43 questions to ask In the last blog post, Is outsourcing your IT security right for your organization, we looked at why some companies choose to … Read More
Is outsourcing your IT security right for your organization? Imagine you are running a large, swanky five-star hotel where guests expect to pay for luxury services. You might conclude … Read More
How to provide IT security training that works All IT teams in medium to large organizations know that they should be providing regular IT security training to staff … Read More
Are legacy apps lurking on your network? Network audits can be instrumental in sanitizing your systems, ensuring there are no legacy, outdated or vulnerable applications lurking on … Read More
TBG Security secures top placement in the Palmetto Cyber Defense Competition Earlier this month, TBG Security took part in the The Palmetto Cyber Defense Competition (PCDC). Read More
Addressing the PEBCAK scenario: protecting systems against rogue employees (PART 2) In the PART 1, we discussed how non-malicious employees can disrupt business continuity. This post will focus on the malicious or … Read More
The PEBCAK scenario: securing systems against non-malicious employees Ever use the expression PEBCAK? What about ID-Ten-T error?* While many variations exist, they all mean the same thing: user … Read More