blog

Powerful Physical Security Options

Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to make sure a thief or hacker isn’t just walking into your office and making off with your...

Read More

The Modern Worker’s Cybersecurity Training

The modern office can be a pretty monotonous place. When people do similar tasks over and over again, their attention to detail can wane. That may be a problem for your operational efficiency, but depending on what the expectations are, it likely won’t end your company. Ransomware, on the other hand, can be a major problem for any organization it...

Read More

Tip of the Week: Improving Your Wireless Network

A company’s wireless network is a big part of what they do. Not only does it provide the freedom for people to move around, it also spurs on collaboration, enhances coordination, and provides more availability for people to be productive. Problems abound with many organizations’ Wi-Fi strategy, however. If your business doesn't take proactive measures to properly manage your wireless...

Read More

What Do You Need Your Business’ Technology to Accomplish?

Service offerings for business technology are kind of tricky to approach for administrators--especially if they have gotten by just fine without implementing new technology for the past few years. We want you to ask yourself if you are absolutely certain that the solutions aren’t needed by your business. You might find that you actually do need them. If nothing else,...

Read More

Four Steps To An Effective Anti-Phishing Solution

Historically, threat actors used phishing tactics, and sent emails to try to dupe unsuspecting victims. These were mass email campaigns with a low success rate. Today, however, attackers carry out targeted and focused tactical email campaigns as part of spear phishing attacks. This solution brief provides a four-step recommendation to bolster your defense against sophisticated phishing email attacks. An effective...

Read More

SamSam Is More than a Computer Virus

I think by now most people understand just how dangerous ransomware is. Even with some of the ridiculous names they have like Gandcrab, Jigsaw, and WannaCry. Hell, two strains even have names from the James Bond canon: LeChiffre and GoldenEye. But one funny-named strain of ransomware, SamSam, has been devastating information systems for sometime, and has caught the eye of...

Read More

Tip of the Week: How to Make Your Smartphone Work Better for You

The holiday season is coming to an end, which means it’s time to get back to the grind in the new year. However, if you happened to receive an Android device as a gift (or maybe treated yourself to one, I’m not judging), you can leverage it to make work a little easier. We’ll give you a few tips how....

Read More

A Letter Back from Santa’s Elves

We’ve always been a proponent of preparing for the worst and hoping for the best where a business’ solutions are concerned. That’s why we were happy to receive an email from our friends at the North Pole telling us about a situation they ran into just a few days ago... Dear NetMGM, I just wanted to send you a quick...

Read More

test ignore me

The original email reputation management system began with the Realtime Blackhole List (RBL). The very first RBL was developed in 1997 by Paul Vixie for the . Referring to a network link that drops rather than forwards incoming traffic, Vixie intended the “blackhole” in this case to drop email traffic from sites that directly sent or enabled spam. The original...

Read More

How Cyber Criminals Can Bypass Your Reputation Management

As technology advances, cyber criminals develop new tactics to carry out new attacks. Real-time Blackhole List (RBL) was developed in 1997 and was the foundation of today’s DNS-based Blackhole List (DNSBL) format. But cyber criminals carry out attacks that undermine and bypass IP reputation management systems. Hence, it is important to for security professionals to evolve and stay ahead of...

Read More