Women in Technology: Meet Nancy By Marissa Withers | July 29, 2020 | Comments Off on Women in Technology: Meet Nancy This month’s Women in Technology feature is Nancy, one of our Project Managers. Learn more in our blog! Read More
How To Set Up Content Filtering on Meraki MX Devices By Stephanie Hamrick | July 23, 2020 | Comments Off on How To Set Up Content Filtering on Meraki MX Devices Content filtering blocks certain categories of websites based on organizational needs/policies. Here’s a quick walkthrough of how to set this up for Meraki MX devices: Step 1: On the Meraki Dashboard, navigate to Security & SD-WAN > Configure > Content Filtering. Step 2: Identity-based policy authentication can be used through Active Directory: Step 3: Category… Read More
Security Exploits Explained: Worms, Trojans, Ransomware, oh my! By Paul Reissner | July 21, 2020 | Comments Off on Security Exploits Explained: Worms, Trojans, Ransomware, oh my! Modern businesses must overcome a wide variety of cyber threat. In this article we answer: what is a Trojan Horse? what is Malware? what is a computer worm? what is Ranswomware? Read More