Passwords. We all have to use them, and like underwear, we have to change them, too. So, what makes a good password? And what makes a good change cycle? Here are six things to keep in mind: Length matters. Strong passwords have a minimum of eight or nine characters. Like a cake, you have to […]
Phishing is one of today’s largest cybersecurity threats. With 90% of data breaches tracing back to a phishing email, it’s crucial that members of your organization don’t fall victim. In this article, we’ll provide a comprehensive guide on how you can stay safe from phishing attacks. We’ll break down what exactly phishing is, how it […]
It’s Monday morning. You sit at the computer, enter your login credentials, slam the ‘Enter’ button, and sigh when your phone goes off in, what always seems to be, any room but the one you’re in. Yes, the ritualistic hunt for your phone has its purpose. Let’s talk about multi-factor authentication, or MFA. Put simply, […]
With organizations today focusing their security efforts on ransomware detection, phishing prevention, and command and control monitoring, many tend to overlook one of the simplest, non-human security weaknesses: Unpatched systems. While exploits to vulnerabilities on unpatched systems don’t cause as many breaches as phishing or social engineering do, they still cause nearly 10% (Verizon Breach […]
As today’s threat landscape continues to grow more complex, managing your organization’s security posture is no easy task. Setting up a powerful data platform like Splunk Cloud or Splunk Enterprise is a great step in the right direction. But is it enough? Not necessarily. For leaders who want to truly make the most out of […]
With 75% of databases expected to be on a cloud platform by the end of 2022, the topic of on-prem vs. cloud is more relevant now than ever. The advantages of cloud computing are many — namely, reduced costs, improved security, increased business agility, stronger backup and disaster recovery, and freed up time. In this […]
I’ll get the deep-nerd stuff out of the way up front: synthetic monitoring has a special place in my heart because it was my way into this whole observability/SRE/IT ops/monitoring space. *Adjusts glasses* My synthetic monitoring journey began as a Network Operations Center (NOC) engineer in the Managed Services department at a software company. When […]
Thinking of joining the SP6 team? Here are four reasons why SP6 is a great place to work. 1. We’re Committed to Our Employees Competitive salaries, benefits, and development opportunities At SP6, you’re more than just a number. We’re invested in the wellbeing of our employees, which is why we offer competitive salaries, benefits, and […]
Choosing a Cybersecurity Professional Services (PS) provider is similar to choosing any other professional provider. Think about how you would go about choosing a doctor, lawyer, or mechanic. Would you look at reviews? Seek out referrals? Conduct brief phone interviews? The process for choosing a PS provider is largely the same. In this article, we’ll […]
As a Splunk Professional Services consultant I have the good fortune of working with really smart and experienced engineers, and the combination of smart and experienced means they’re trying to be as ready as they can for what comes next. In this blog, we’ll discuss how to prepare for a Splunk migration.