January 5, 2022
12 mins read
100 Views
As businesses continue to pull through the economic storm brought by the COVID-19 pandemic, it appears that they will also have to navigate the..
Read More
|
January 1, 2022
15 mins read
129 Views
Receiving a SOC 2 Type 2 certification is no small undertaking. For us here at Jones IT, it took hundreds of hours of assessments, planning, and..
Read More
|
December 29, 2021
6 mins read
123 Views
This blog post talks about the Log4j vulnerability, how it works, why it is critical, who it affects, and steps your business can take to reduce the..
Read More
|
October 23, 2021
11 mins read
94 Views
This blog post talks about the Principle Of Least Privilege (PoLP), which is considered a best practice in information security, the importance of..
Read More
|
October 16, 2021
14 mins read
126 Views
The traditional security models are no longer completely reliable. The dynamic technology and threat landscapes necessitate a different security..
Read More
|
September 13, 2021
11 mins read
270 Views
Organizations around the world regularly fall victim to business email compromise (BEC) attacks. These attacks are financially motivated, cleverly..
Read More
|