by Miguel Morales | Sep 19, 2022 | IT Support
Magic links provide a way for users to authenticate without a password (or what it’s called “passwordless authentication” that we already talked about weeks before). The entire authentication process with a magic link involves the user providing their email and then...
by Miguel Morales | Sep 12, 2022 | IT Support
Secure Access Service Edge, or short for SASE, is a powerful IT solution that can help your organization better protect the data and technologies used by your employees, whether they’re onsite or remote. The new landscape requires a modern solution that offers...
by Miguel Morales | Aug 15, 2022 | IT Support
Business impact analysis is a tool that helps plan for the inevitability of consequences and their cost. It is another measure to combat risk. Risk is always on the horizon and the better-equipped companies that prepare for it, the more likely they will be able to...
by Miguel Morales | Aug 8, 2022 | IT Support
Cross-Site Request Forgery (CSRF/XSRF), also known as Sea Surfing or Session Riding, is a web security vulnerability that tricks a web browser into performing an unintended action. Consequently, the attacker abuses the trust that a web application has in the...
by Miguel Morales | Aug 1, 2022 | IT Support
A well-planned cyberattack against a government or a large company is a terrifying prospect. Particularly when the attack is designed to infiltrate a network for an extended time to steal sensitive data. This type of campaign is known as an advanced persistent threat...