Security Tag - Page 2 of 16 - Kutztown, Pennsylvania | Lantek

    blog-img

    The United States National Security Agency, or NSA, is well known for its expertise in cybersecurity. So, when the NSA releases practices to help keep mobile devices more secure, it's smart to pay attention to what it says.

    Read More
    blog-img

    Cybersecurity tops the list for any business’ needs, particularly when one considers just how many threats are out there today. This makes it essential that today’s businesses (yours included) put an assortment of cybersecurity tools and protections in place.

    Read More
    blog-img

    Strong passwords are extremely important these days. Cybercriminals only need low-end hardware to crack millions of passwords at once, so it's critical to use random, complex strings of characters.

    Read More
    blog-img

    Modern companies (yours included) should never function without strong cybersecurity measures. This is a stance we will stress at every chance. 

    Read More
    blog-img

    No one actually likes to talk about password security, but it’s incredibly important to the ongoing security of your business. If you or any of your employees are using any of these commonly used passwords, then read on; you’re someone who desperately needs to reconsider their password policies.

    Read More
    blog-img

    Whether or not most of your business understands why they must remain compliant to various rules and regulations, it is crucial that your entire team does so. Let’s look at what contributes to your compliance as a way to conceptualize just how important it is to maintain.

    Read More
    blog-img

    Sometimes, it seems like the most complex aspect of modern technology is the naming conventions used by big vendors for all of their products. It’s a problem with consumer electronics, it’s a problem with enterprise products, and sometimes it feels like some companies make their products as confusing as possible on purpose… I’m looking at you, Microsoft.

    Read More
    blog-img

    Cybersecurity is necessary for businesses to function, but when it turns to overreaching and overinvestment—a concept called cybersecurity sprawl—it becomes a problem. Today, we want to highlight some of the many challenges that can come about from cybersecurity sprawl, as well as how you can avoid it.

    Read More
    blog-img

    You’ve more likely than not purchased a ticket through Ticketmaster at some point in your lifetime, so you might be interested to find out that Live Nation Entertainment—Ticketmaster’s parent company—has had to file an 8-K with the Security and Exchange Commission to admit that 1.3 terabytes of data had been hacked. The result is that more than 560 million customers’ personal information was stolen from company servers.

    Read More
    blog-img

    Asset management security has become a critical concern for businesses. It's not just about protecting physical assets anymore. More assets than ever need to be safeguarded, but securing these assets is not straightforward. It involves a complex interplay of strategies, from attack surface management to cybersecurity compliance.

    Read More