by spladmin | May 20, 2024 | Uncategorized
Well, maybe not yet, but it’s definitely moving in that direction. The basic tenant of current security is that you authenticate using 3 types of information: Something you are, such as a username or email address. Something you know, such as a password or PIN. ...
by spladmin | Aug 30, 2022 | Uncategorized
Authors Note: As many of you have probably surmised, I write my own blogs. Blogs are often authored by a service and then replicated, especially in IT. Instead, I like to choose the topics that might be of most interest to our clients and write to them – you...
by spladmin | Jul 26, 2022 | Uncategorized
So, your company is implementing a hybrid work model where your staff works from home a few days a week. Or maybe your company is going fully remote and closing the office. By this time, your company has probably updated their Information Security Policy...
by spladmin | May 31, 2022 | Uncategorized
With the rapid increase in data breaches and ransomware attacks, proper password and authentication management is vital for companies to protect their local and cloud assets. But with that importance also comes increased complexity and the need to deal with more...
by spladmin | Apr 26, 2022 | Uncategorized
In May of last year, I wrote about the forthcoming Cybersecurity Maturity Model Certification, or CMMC, regulations for DoD contractors and how it could become the new universal security standard (see https://www.spotlink.com/blog/cmmc). At that time, CMMC was...
by spladmin | Mar 22, 2022 | Uncategorized
What steps should small businesses take? The Russian invasion of Ukraine is both bad and sad on many levels, and in many ways. Luckily for us in the United States, other than some inflationary pressures, especially in gas prices, we have largely been unaffected...