The importance of Patch Management

https://www.zdnet.com/article/pc-security-warning-that-out-of-date-software-is-putting-you-at-risk/ Please read the summary of the link above by Danny Palmer on Avast’s latest PC Trends report for 2019. The importance of up to date applications/programs on your PC and in your business cannot be understated.  The advanced threats in today’s cyber world are usually now enabled by a 3rd party software flaw that…

Read More

All about Bitlocker

https://www.zdnet.com/article/windows-10-experts-guide-everything-you-need-to-know-about-bitlocker/ Check out this comprehensive article on Windows Bitlocker by Ed Bott on ZDNet.com at the link above. Security is the name of the digital game, and Bitlocker is an important tool in your arsenal. At Monarchy IT, we built our company on security.  Do you want an IT support company for your business that…

Read More

What is ransomware? Everything you need to know about one of the biggest menaces on the web

https://www.zdnet.com/article/ransomware-an-executive-guide-to-one-of-the-biggest-menaces-on-the-web/ Check out the ultimate updated guide by Danny Palmer over at ZDNet.com at the link above . It is a tour de force of workmanship, and the detail is no gloss; it’s a great summation for any business leader or owner wanting a 360-degree look at the growing problem that is taking the cyber…

Read More

Cloud Security Trends: Winter is Coming

https://blog.redlock.io/cloud-security-trends-and-cloud-threat-defense Check out this report from RedLock on their recent cloud security findings.  Needless to say, it leaves a lot to be desired. While “the cloud” has been all the rage in the small/medium business space for the last 5 years or so, the implementation of security over these services is still evolving. At Monarchy…

Read More

Equifax breach

News got out on the 8th that Equifax, one of the 3 main credit bureau’s in the US, was breached months prior, exposing over 143 million confidential records. The hack was caused by numerous poor security measures by their internal IT structure, making it simple for the perpetrators to gather sensitive data. Please check the…

Read More