Proudly serving Virginia, Maryland and DC // Call us today! 703.396.6120
V2 SystemsV2 Systems
At V2 Systems, We Use Cisco Umbrella. You Should, Too.

By Erik Briceno

At V2 Systems, We Use Cisco Umbrella. You Should, Too.

Are you familiar with Cisco and their many products? If you use our services, you might be surprised to know that we use Cisco Umbrella to help keep you safe. Let’s take a closer look at what Cisco Umbrella is, and how we utilize it to help keep your business secure from outside threats. What makes this product superior to others on the market?

It’s certainly not the only tool in our arsenal, but it’s definitely a good one. Here’s a more in-depth look at this full suite of detection and protection.   Read more

In-House Security Training: Knowledge That Everyone Should Know

By Erik Briceno

In-House Security Training: Knowledge That Everyone Should Know

Being a security-minded company means having in-house staff that are properly trained in being security-minded. Although Cybersecurity Awareness Month may be ending, it is always in your organization’s best interest to maintain vigilance — not just one month out of the year.

While hiring a managed security service provider is a critical first step, cybersecurity awareness certainly doesn’t end there and depends on everyone who works for you being informed and educated on this subject. To that end, let us explain how in-house cybersecurity training is something you should consider doing.   Read more

Seriously, Please Stop Using Internet Explorer

By Erik Briceno

Seriously, Please Stop Using Internet Explorer

On our social media feed, we’ve posted about the dangers of using Internet Explorer — the depreciated web browser from Microsoft’s bygone age — more times than an IT service should probably have to. Unfortunately, there are many businesses of all sizes who still utilize it or rely on its architecture, and it’s something we all really need to start moving past. A recent discovery involving the browser is just one of nearly countless examples.   Read more

NIST SP 800-171 Is Now More Important Than Ever: Are You Following the Framework?

By Erik Briceno

NIST SP 800-171 Is Now More Important Than Ever: Are You Following the Framework?

The National Institute of Standards and Technology, more commonly referred to as NIST, puts out extremely important guidelines to follow, and we have covered those guidelines at length in past articles. However, there have been quite a few changes since we last wrote about them. Today, we’re putting out a refresher on the subject for readers who are unfamiliar with NIST compliance, as well as sources for some of the more recent, important updates to NIST standards.   Read more

Yes, Data Breaches Are Still a Thing

By Erik Briceno

Yes, Data Breaches Are Still a Thing

Ransomware may have been dominating the news cycle over the last couple of months, but data breaches are also occurring at a similar frequency. To this day, we’re still feeling the fallout from the Equifax breach, even though that was all the way back in May of 2017.

While we’re still dealing with the consequences from that, what’s been happening since then? Glad you asked. Let’s take a look.   Read more

By Erik Briceno

“Please Patch Your Windows. Pretty Please?” – Microsoft

Do you remember WannaCry? Two years ago, it was arguably the most destructive cyberworm in history — shutting down hospitals, banks, transportation and shipping companies. Perhaps one of the most baffling things of all, though, is the fact that WannaCry didn’t exist until two months AFTER Microsoft had already released a patch that would fix the very vulnerability the worm took advantage of.

Now, in 2019, the same thing is happening again with a vulnerability known as BlueKeep. This security risk is so severe that not only did Microsoft update Windows 10, they even went out of their way to patch its depreciated operating systems: Windows 2003, Windows XP and Windows Vista.   Read more

Security Information and Event Management: Giving You a Big Picture for Cybersecurity Protection

By Erik Briceno

Security Information and Event Management: Giving You a Big Picture for Cybersecurity Protection

Security Information and Event Management, known as SIEM, is a security system that gathers data from a wide variety of sources to monitor, identify, record and analyze security incidents within a real-time IT environment.

SIEM supplies the user with a comprehensive and centralized view of the security scenario of an IT infrastructure.

In other words, a SIEM paints the ultimate “big picture” of your cybersecurity situation, an early warning system that provides everything you need to troubleshoot and secure your IT environment. It’s a search-and-analyze tool that gives you the power to destroy threats.   Read more

By Erik Briceno

Vulnerability Management: 4 Essential Steps to Protect Your Business From Cyberthreats

A key to protecting against cybersecurity threats is understanding your risks. Vulnerability Management (VM) is a critical tool in your arsenal designed to do just that — to proactively mitigate or prevent saboteurs from exploiting the IT vulnerabilities that exist in any system or organization.

To achieve that, you need a vulnerability assessment system to quickly and easily identify and fix vulnerabilities — including software flaws, missing patches, malware and misconfigurations — across a variety of operating systems, devices and applications.   Read more

Stopping Threats Before They Happen: 4 Ways Cisco Umbrella Protects Your Business

By Erik Briceno

Stopping Threats Before They Happen: 4 Ways Cisco Umbrella Protects Your Business

With more people working remotely and more devices connecting to the internet every day, having a strong line of defense against cyberthreats is critical to the success of your business mission.

Cisco Umbrella is a cloud security platform that can provide that first line of defense, no matter where your workers are located or what devices they’re using.   Read more

1 2 3 4
At V2 Systems, We Use Cisco Umbrella. You Should, Too.
At V2 Systems, We Use Cisco Umbrella. You Should, Too.
In-House Security Training: Knowledge That Everyone Should Know
In-House Security Training: Knowledge That Everyone Should Know
Seriously, Please Stop Using Internet Explorer
Seriously, Please Stop Using Internet Explorer
NIST SP 800-171 Is Now More Important Than Ever: Are You Following the Framework?
NIST SP 800-171 Is Now More Important Than Ever: Are You Following the Framework?
Yes, Data Breaches Are Still a Thing
Yes, Data Breaches Are Still a Thing
“Please Patch Your Windows. Pretty Please?” – Microsoft
Security Information and Event Management: Giving You a Big Picture for Cybersecurity Protection
Security Information and Event Management: Giving You a Big Picture for Cybersecurity Protection
Secure Internet Gateway: 3 Ways a SIG Guards Your Business
Secure Internet Gateway: 3 Ways a SIG Guards Your Business
Vulnerability Management: 4 Essential Steps to Protect Your Business From Cyberthreats
Stopping Threats Before They Happen: 4 Ways Cisco Umbrella Protects Your Business
Stopping Threats Before They Happen: 4 Ways Cisco Umbrella Protects Your Business