Proudly serving Virginia, Maryland and DC // Call us today! 703.396.6120
V2 SystemsV2 Systems
Seriously, Please Stop Using Internet Explorer

By Erik Briceno

Seriously, Please Stop Using Internet Explorer

On our social media feed, we’ve posted about the dangers of using Internet Explorer — the depreciated web browser from Microsoft’s bygone age — more times than an IT service should probably have to. Unfortunately, there are many businesses of all sizes who still utilize it or rely on its architecture, and it’s something we all really need to start moving past. A recent discovery involving the browser is just one of nearly countless examples.   Read more

NIST SP 800-171 Is Now More Important Than Ever: Are You Following the Framework?

By Erik Briceno

NIST SP 800-171 Is Now More Important Than Ever: Are You Following the Framework?

The National Institute of Standards and Technology, more commonly referred to as NIST, puts out extremely important guidelines to follow, and we have covered those guidelines at length in past articles. However, there have been quite a few changes since we last wrote about them. Today, we’re putting out a refresher on the subject for readers who are unfamiliar with NIST compliance, as well as sources for some of the more recent, important updates to NIST standards.   Read more

Yes, Data Breaches Are Still a Thing

By Erik Briceno

Yes, Data Breaches Are Still a Thing

Ransomware may have been dominating the news cycle over the last couple of months, but data breaches are also occurring at a similar frequency. To this day, we’re still feeling the fallout from the Equifax breach, even though that was all the way back in May of 2017.

While we’re still dealing with the consequences from that, what’s been happening since then? Glad you asked. Let’s take a look.   Read more

By Erik Briceno

“Please Patch Your Windows. Pretty Please?” – Microsoft

Do you remember WannaCry? Two years ago, it was arguably the most destructive cyberworm in history — shutting down hospitals, banks, transportation and shipping companies. Perhaps one of the most baffling things of all, though, is the fact that WannaCry didn’t exist until two months AFTER Microsoft had already released a patch that would fix the very vulnerability the worm took advantage of.

Now, in 2019, the same thing is happening again with a vulnerability known as BlueKeep. This security risk is so severe that not only did Microsoft update Windows 10, they even went out of their way to patch its depreciated operating systems: Windows 2003, Windows XP and Windows Vista.   Read more

Security Information and Event Management: Giving You a Big Picture for Cybersecurity Protection

By Erik Briceno

Security Information and Event Management: Giving You a Big Picture for Cybersecurity Protection

Security Information and Event Management, known as SIEM, is a security system that gathers data from a wide variety of sources to monitor, identify, record and analyze security incidents within a real-time IT environment.

SIEM supplies the user with a comprehensive and centralized view of the security scenario of an IT infrastructure.

In other words, a SIEM paints the ultimate “big picture” of your cybersecurity situation, an early warning system that provides everything you need to troubleshoot and secure your IT environment. It’s a search-and-analyze tool that gives you the power to destroy threats.   Read more

By Erik Briceno

Vulnerability Management: 4 Essential Steps to Protect Your Business From Cyberthreats

A key to protecting against cybersecurity threats is understanding your risks. Vulnerability Management (VM) is a critical tool in your arsenal designed to do just that — to proactively mitigate or prevent saboteurs from exploiting the IT vulnerabilities that exist in any system or organization.

To achieve that, you need a vulnerability assessment system to quickly and easily identify and fix vulnerabilities — including software flaws, missing patches, malware and misconfigurations — across a variety of operating systems, devices and applications.   Read more

Stopping Threats Before They Happen: 4 Ways Cisco Umbrella Protects Your Business

By Erik Briceno

Stopping Threats Before They Happen: 4 Ways Cisco Umbrella Protects Your Business

With more people working remotely and more devices connecting to the internet every day, having a strong line of defense against cyberthreats is critical to the success of your business mission.

Cisco Umbrella is a cloud security platform that can provide that first line of defense, no matter where your workers are located or what devices they’re using.   Read more

Meraki Advanced Security License: 5 Reasons Why You Need State-of-the-Art Cybersecurity Protection

By Erik Briceno

Meraki Advanced Security License: 5 Reasons Why You Need State-of-the-Art Cybersecurity Protection

When it comes to protecting your business from security threats, a unified threat management (UTM) service provides a simplified method that integrates multiple security services and features.

This type of service lets your business combine critical security features — such as intrusion detection and prevention, VPN, firewalling, content filtering and anti-phishing/anti-malware filtering — into a single solution designed for small and medium-sized organizations.   Read more

By Erik Briceno

How To Protect Your Business Data With a VPN

When you connect directly to the internet, your activity and data, from business emails to banking transactions, is exposed to the possibility that someone else can see it, exploit it or steal it.

That’s why a VPN, or Virtual Private Network, is an essential business tool that allows users to securely access a private network and share data remotely through public networks.   Read more

1 2 3 4
Seriously, Please Stop Using Internet Explorer
Seriously, Please Stop Using Internet Explorer
NIST SP 800-171 Is Now More Important Than Ever: Are You Following the Framework?
NIST SP 800-171 Is Now More Important Than Ever: Are You Following the Framework?
Yes, Data Breaches Are Still a Thing
Yes, Data Breaches Are Still a Thing
“Please Patch Your Windows. Pretty Please?” – Microsoft
Security Information and Event Management: Giving You a Big Picture for Cybersecurity Protection
Security Information and Event Management: Giving You a Big Picture for Cybersecurity Protection
Secure Internet Gateway: 3 Ways a SIG Guards Your Business
Secure Internet Gateway: 3 Ways a SIG Guards Your Business
Vulnerability Management: 4 Essential Steps to Protect Your Business From Cyberthreats
Stopping Threats Before They Happen: 4 Ways Cisco Umbrella Protects Your Business
Stopping Threats Before They Happen: 4 Ways Cisco Umbrella Protects Your Business
Meraki Advanced Security License: 5 Reasons Why You Need State-of-the-Art Cybersecurity Protection
Meraki Advanced Security License: 5 Reasons Why You Need State-of-the-Art Cybersecurity Protection
How To Protect Your Business Data With a VPN