Intel Security Announces End of Life (EoL) for McAfee SaaS Email Protection Products
Intel has recently announced End of Life (EoL) for McAfee SaaS Email Protection (MX Logic) products. In this post we will explain what this announcement means, and discuss Proofpoint, the alternative solution to McAfee SaaS Email Protection.
Creating Cyber Awareness
October has been designated National Cyber Security Awareness Month with the goal of raising awareness about cybersecurity. While small businesses may not consider themselves targets for cyber attacks, small businesses have valuable information cyber criminals seek, such as employee and customer records, bank account information and access to the business’s finances, and access to larger networks. In some ways, small businesses are at a higher risk of cyber-attacks than larger businesses because they often have fewer resources dedicated to cybersecurity.
Contact Us
Urgent Internet Security Vulnerability: Heartbleed Bug – Test Your Site Now
Security experts announced a major security vulnerability flaw in OpenSSL, a popular data encryption standard. Known as “Heartbleed” this bug is a flaw in software that’s widely used to secure Web communication, meaning that passwords and other highly sensitive data…
Best Practices to Prepare for Natural or IT Disasters
With the potential impact of natural disasters and other disruptive events, you must be protected with a disaster, emergency response and business continuity plan. In a proper plan, 3 critical components that are planned for protection are People (employees, customers),…
Protecting Against the New Breed of Trojans and Viruses
In today’s sophisticated threat landscape – with the rise of hosted services, interactive sites and cloud services – protecting your organization using the old breed of anti-virus software simply isn’t enough. Many zero day attacks manage to get past typical…
Data Security in the Cloud
Many considering cloud computing raise concerns about the security of data being stored and accessed online. What’s important to consider is that good providers adhere to strict privacy policies and sophisticated security measures, with data encryption being one example. Companies…