The modern technology landscape is constantly changing, and business owners need to keep up to maintain a technologically efficient and secure environment. One of the latest changes in security and...
Read More
Since the start of the COVID-19 pandemic, hybrid and remote work has never been easier or more accessible. With this shift to accessing systems remotely, came a spike in cloud...
Read More
One of the biggest security threats all organizations face today is ransomware, and based on how successful and lucrative certain ransomware attacks have been, all signs point to these attacks...
Read More
Cisco announced on July 10th, 2019 that there is a vulnerability in the cryptographic driver for Cisco ASA software and FTD software that could allow an unauthenticated, remote attacker to…
In smaller “mom and pop” networks, all the resources and users are all on the same Local Area Network (LAN). These are the easiest to setup and typically resemble most...
Read More
Here’s a quick walkthrough on how to add and remove devices (MX series and Z1) from the Meraki Dashboard to keep everything in your network up to date. How to...
Read More
This blog is part three of a series on IT Security where PEI is examining modern threats and new security trends. In part one, we discussed phishing attacks. In part...
Read More
This blog is part of a series on IT Security we’ve created to examine threats in the modern security landscape. So far we’ve discussed the human element of security—and how...
Read More
A new security flaw was found in WPA2. The researchers who discovered it have termed this new hole a KRACK (Key Reinstall Attacks). Since most corporate wireless networks using a…