January 5, 2022
12 mins read
227 Views
As businesses continue to pull through the economic storm brought by the COVID-19 pandemic, it appears that they will also have to navigate the..
Read More
|
January 1, 2022
15 mins read
280 Views
Receiving a SOC 2 Type 2 certification is no small undertaking. For us here at Jones IT, it took hundreds of hours of assessments, planning, and..
Read More
|
December 29, 2021
6 mins read
280 Views
This blog post talks about the Log4j vulnerability, how it works, why it is critical, who it affects, and steps your business can take to reduce the..
Read More
|
October 23, 2021
11 mins read
225 Views
This blog post talks about the Principle Of Least Privilege (PoLP), which is considered a best practice in information security, the importance of..
Read More
|
October 16, 2021
14 mins read
249 Views
The traditional security models are no longer completely reliable. The dynamic technology and threat landscapes necessitate a different security..
Read More
|
September 13, 2021
11 mins read
414 Views
Organizations around the world regularly fall victim to business email compromise (BEC) attacks. These attacks are financially motivated, cleverly..
Read More
|