Proudly serving Virginia, Maryland and DC // Call us today! 703.396.6120
V2 SystemsV2 Systems
Why It’s Time to Stop Using Single Factor Authentication

By Erik Briceno

Why It’s Time to Stop Using Single Factor Authentication

We’ve talked about the importance of multi-factor authentication (MFA) on our social media channels quite often. And now, in a recent bulletin put out by the Cybersecurity Infrastructure and Security Agency (CISA), they have made an official recommendation to businesses and organizations that single factor authentication (SFA) should no longer be used.

In light of this, we felt the importance of publishing a quick review on multi-factor authentication, or MFA, why it’s so essential, and what it entails.   Read more

Multi-Factor Authentication — Why It’s More Important Than Ever

By Erik Briceno

Multi-Factor Authentication — Why It’s More Important Than Ever

These days, everyone should know what MFA is. Multi-factor authentication (MFA) is something we’ve covered before as an important, basic step in cybersecurity hygiene. It’s so important in fact, that it’s even part of the Cybersecurity Maturity Model Certification (CMMC) framework.

For those of you who are still unfamiliar with MFA and/or how to implement it, here is a quick but important refresher.   Read more

Commonality of Data Breaches Increases: The Damage Is Worse Than You Think.

By Erik Briceno

Commonality of Data Breaches Increases: The Damage Is Worse Than You Think

In the new global remote work environment, never before have data breaches been more dangerous — or more commonplace. But do you fully understand why they’re dangerous?

Even setting aside the personal ways they affect everyone involved on an individual level — and even setting aside the fact that they could allow a nation-state threat actor to steal and commit espionage against U.S. government contractors — they have the potential to severely disrupt, if not outright destroy, organizations and enterprises of all sizes. In light of recent events, today’s article outlines the various ways data breaches can harm your company and why cybersecurity needs to be moved to the forefront of everything you do.   Read more

The U.S. Faces Two Distinct Threats When It Comes to Cyber Breaches

By Erik Briceno

The U.S. Faces Two Distinct Threats When It Comes to Cyber Breaches

According to former senior NSA official Glenn Gerstell: “There clearly is a dividing line between cyber hacks for intelligence gathering purposes, and these ransomware attacks that are designed principally for financial benefit.”

On one side of that line is the SolarWinds attack uncovered last December. The U.S. government says this was primarily an intelligence gathering operation carried out by Russia’s foreign intelligence service, the SVR, which was quietly stealing U.S. government secrets for months.

On the other side is ransomware, which is surging. Russian criminal gangs are blamed for both the Colonial Pipeline attack that hit gasoline supplies on the East Coast of the U.S. in May and an even more recent hack that briefly shut down the world’s largest meat supplier, JBS.   Read more

By Erik Briceno

Let Them Work From Home, But Don’t Leave Yourself Vulnerable

If you’re like many organizations right now, you’ve probably embraced a work-from-home policy. Even as things start slowly returning to normalcy, many organizations — and especially employees — are choosing to remain within a remote work or hybrid framework. But are you implementing it securely? Enabling workers to access the systems and data they need from home can create a wide range of cyber risks that attackers can be quick to exploit. Here are some of the most critical vulnerabilities that enterprises of all sizes need to watch out for.   Read more

Security Solutions for an Increasingly Dangerous Landscape

By Erik Briceno

Security Solutions for an Increasingly Dangerous Landscape

As technology progresses, so do the variety of threats to your IT environment and sensitive information. Rogue hackers, corporate saboteurs and vandals are a constant issue. New malware and ransomware are popping up every day. Government mandates and corporate requirements make security a top priority for conducting business today. The best protection comes from safeguards that are an integral part of your network infrastructure, software and management right from the start.   Read more

By Erik Briceno

Tired of being alarmed? Don’t become complacent.

In this year alone, ransomware attacks and data breaches are occurring at such frequency that it’s now become almost commonplace. When we hear it in the news, we simply shrug our shoulders and say, “Oh great, another one.”

The fact that it happens so often should not soften the severity of it. If anything, it should raise our state of alarm even higher. The problem is, we’ve become so fatigued by alarm. How do you remain vigilant despite this fatigue?   Read more

Incident Response Plans: Necessities for 2021 and Beyond

By Erik Briceno

Incident Response Plans: Necessities for 2021 and Beyond

You never want a cybersecurity incident to happen. But in today’s complex technological landscape, it does happen — frequently. Therefore, you need to be prepared to implement an incident response plan that will help your business reduce the risks, costs and recovery time associated with a security breach or cyberattack. Not doing so directly affects your company’s bottom line.

Small to midsize businesses can take steps to counter the ever-evolving threat of cyberattacks and become “cyber ready.” These steps are not overly complex or costly, and businesses can significantly protect themselves by taking action.   Read more

The New Normal Requires a Zero Trust Architecture

By Erik Briceno

The New Normal Requires a Zero Trust Architecture

As the technologies that support zero trust architecture move increasingly further into the mainstream, CIOs, CISOs and other corporate executives are rushing to adopt it. But what is zero trust? And why should you care?

As cyberattacks become ever more sophisticated, a zero trust network could be the best means of protecting enterprise systems and their data. This holds especially true in this new normal of remote working.   Read more

1 2 3 4 16
Why It’s Time to Stop Using Single Factor Authentication
Why It’s Time to Stop Using Single Factor Authentication
Multi-Factor Authentication — Why It’s More Important Than Ever
Multi-Factor Authentication — Why It’s More Important Than Ever
MSSP in a Post-COVID World
MSSP in a Post-COVID World
Commonality of Data Breaches Increases: The Damage Is Worse Than You Think.
Commonality of Data Breaches Increases: The Damage Is Worse Than You Think
The U.S. Faces Two Distinct Threats When It Comes to Cyber Breaches
The U.S. Faces Two Distinct Threats When It Comes to Cyber Breaches
Let Them Work From Home, But Don’t Leave Yourself Vulnerable
Security Solutions for an Increasingly Dangerous Landscape
Security Solutions for an Increasingly Dangerous Landscape
Tired of being alarmed? Don’t become complacent.
Incident Response Plans: Necessities for 2021 and Beyond
Incident Response Plans: Necessities for 2021 and Beyond
The New Normal Requires a Zero Trust Architecture
The New Normal Requires a Zero Trust Architecture