AdvancePro Technologies | CIO Story Logo - AdvancePro Technologies

Leading indicators that you have a vendor who is compromised

| | All Blog Posts
The average IT or security administrator has enough on their hands worrying about their company’s own users, much less their third-party vendors and business partner users of their resources. However, if you don’t spend time securing this commonly used attack vector, you may be in for a surprise. While many ... Read More

Active Directory is not the silver bullet for IAM best practices

| | All Blog Posts
Microsoft’s Active Directory (AD), the most dominant directory service for handling logins and other administrative functions on Windows networks has been a godsend for many IT administrators looking for a one-stop-shop to handle the Identity Access Management (IAM) functions within their organizations. And while AD works great for the core ... Read More
IoT security

IoT and Vendors: How To Stay Safe

The internet of things, or IoT, is growing faster than a weed in the summertime. This catch-all name covers everything from your front door security cameras to factory floor control devices, often called the industrial internet of things (IIoT). As this technology expands and everything becomes networked, from our toasters ... Read More
Security Boulevard

7 common VPN problems: The not-so-good, the bad, and the ugly

| | All Blog Posts
A Virtual Private Network (VPN) is perfect for internal employees who need to access the server (or section of the server) from anywhere besides the office. In fact, at SecureLink we use VPN client software on our laptops to do just that; if you need to work remotely and need ... Read More
Avoiding healthcare vendor compliance nightmares with third-party remote access best practices

Avoiding healthcare vendor compliance nightmares with third-party remote access best practices

| | All Blog Posts
As the move to focus corporate resources on core business functions has increased and intensified, the outsourcing trend has impacted all sizes and types of companies. With the software as a service (SaaS) model becoming the norm within most enterprises, very few technology platforms are developed and maintained exclusively in-house ... Read More
How to evaluate different pricing models for cybersecurity software platforms

How to evaluate different pricing models for cybersecurity software platforms

| | All Blog Posts
When evaluating a cybersecurity solution, there are many factors that come into play. Obviously features and functionality should come first. After all, a cheap solution that doesn’t properly solve the problem you’re trying to solve is no solution at all. But at the end of the day, we all have ... Read More

Remote workforce solutions for all seasons and sizes

| | All Blog Posts
The COVID-19 pandemic among the many major impacts, both personal and professional, has also caused a huge upsurge in the demand for remote workforce technologies. The security around video conferencing apps such as Zoom, Skype, and others has definitely captured the attention of the media but for most companies, just ... Read More

Using vendor management audit checklists to identify, monitor, & audit vendors on your network

| | All Blog Posts
Using outside vendors can be a godsend for many organizations. These third parties provide the ability to scale a business, bring new and vital expertise to bear on problems, and let you concentrate on core competencies. However, vendors can also bring a great deal of risk, especially when it comes ... Read More

The cost of third-party remote access noncompliance: HIPAA edition

| | All Blog Posts
It’s no news to healthcare-related organizations that if they handle personal health information (PHI) or electronic personal health information (ePHI), they are required to maintain HIPAA/HITECH compliance. These regulations are stringent, and staying compliant can be difficult. Covered entities find themselves in a difficult position, as their HIPAA compliance is ... Read More
Increased credential threats in the age of uncertainty

Increased credential threats in the age of uncertainty

| | All Blog Posts
In these strange times, companies face increased and expanded cybersecurity threats. Enterprise security perimeters expanded exponentially almost overnight as both employees and vendor reps work from their homes. Threat actors are using the pandemic to create new devious phishing and social engineering campaigns with which to lure your staff. And ... Read More