Blog & Resources

Smarter Security

Threat intelligence provides the actionable information organizations need to enhance their security strategies.

Most security tools are designed to detect and defend against specific types of cyberattacks. Firewalls allow only trusted traffic to flow through, while intrusion prevention systems examine data packets and drop those that appear to be malicious.

Why Outsourcing Security Is the Best Choice for SMBs

Most small to midsize businesses (SMBs) are aware of the dangers of cyberattacks, and many are purchasing security tools in an effort to beef up their defenses. But is that enough?

Suppose you decide to invest in a state-of-the-art firewall, encryption software and other security tools.

New HPE Servers Help Thwart Firmware Exploits

In The Invisible Man, author H.G. Wells’ main character is stealthy, persistent, formidable and enthusiastically destructive. Those same characteristics describe the emerging class of malware known as firmware exploits.

Firmware attacks target the hard-coded programming written into nonvolatile memory in order to control the function of various hardware devices.

Don’t Underestimate Insider Threats

On the night of August 24, 410, an army of Visigoth warriors slipped into Rome through the Salarian Gate and proceeded to burn and plunder the great walled city for three days. It was the first time in nearly 800 years that Rome had fallen to a foreign enemy, and historians often cite the event as marking the end of the Western Roman Empire.

How to Develop IT Policies that Address Your Organization’s Specific Needs

In our last post, we outlined nine must-have IT policies for reducing security and compliance risks. (add link when published) Many organizations have responded to the uptick in cyberattacks by upgrading their IT security arsenal. However, the best security technology in the world will have limited effectiveness if you don’t have policies and procedures in place to support an overarching security strategy.

Join Verteks Consulting at the Tampa Data Connectors Cybersecurity Conference on Febrauary 1, 2018

Overview

The Tampa Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.

Verteks Consulting is proud to sponsor FLGISA Winter Conference January 30-Febraury 1, 2018

JOIN US ON JANUARY 30-FEBRUARY 1, 2018
The Florida Local Government Information Systems Association invites you to join us for the 2018 Winter Conference at the Embassy Suites Lake Buena Vista South on January 30-February 1, 2018. The conference is open to all local government employees and technology professionals that want to learn more about technology.

Just released our free eBook, 20 Signs That Your Business is Ready for Managed ServicesDownload
+