Cisco Advanced Malware Protection for Endpoint Security
Continue readingHome LookingPoint Blog
Cisco Advanced Malware Protection for Endpoint Security
Continue readingCisco released the below critical security advisory yesterday regarding a vulnerability in the SSL VPN functionality of Cisco ASA software. Contact us if you have questions or would like help with the remediation of this vulnerability.
Continue readingHappy New Year loyal LP blog readers, and what a start to the year we have had. Unless you have had your head in the sand for the last week you cannot help but have heard all the buzz around the latest two high profile security vulnerabilities to hit our networks. I am of course referring to the infamous Spectre and Meltdown flaws. Cue dramatic music “Dun Dun Duuuun!!!!”
Continue readingWe’ve said it time and time again, cybersecurity is a leading concern and area of focus for IT teams everywhere. 2017 saw new emerging and rapidly evolving cyber threats, and they aren’t going anywhere in 2018.
Continue readingSecurity has been a leading topic throughout 2017 across all industries. Malware, more specifically ransomware, has been a dominant cyber threat with damage costs predicted to exceed $5 billion this year, according to Cybersecurity Ventures.Cisco recently released their 2017 Annual Cybersecurity Report. This year is the 10-year anniversary of the annual report, which provides key insights and...
Continue readingIn this Fireside Chat CEO, Sean Barr, sits down with Principal Network Architect, John Li, to discuss one of the hottest IT topics of 2017: security. Sit back, relax, and enjoy this Fireside Chat.
Continue readingSecurity is something that most IT folks have a love/ hate relationship with. OK, mostly hate… because data security is not easy and it’s not something you can just do and forget about, instead you must continuously adapt your network security to keep up with evolving threats and mitigate risk.
Continue readingOn Monday Mathy Vanhoef and Frank Piessens, from the University of Leuven, published a paper disclosing a series of vulnerabilities that affect the Wi-Fi Protected Access (WPA) and the Wi-Fi Protected Access II (WPA2) protocols. These vulnerabilities described a set of scenarios where a malicious user can perform a man-in-the-middle replay attack on wireless users connected to the network using...
Continue readingWhat is Two-Factor Authentication?
At its core, two-factor authentication is all about checking credentials. Are you who you say you are? Traditionally, a user name and password are used to log into a secure system. Two-factor authentication provides an additional layer of security, in the form of something you physically have, to be able to log into the system. This can be a physical token in...
Continue readingLooking Point Inc. 2019