Posts

different endpoints on a desk laptop desktop phone tablet

4 common endpoints you should be protecting

In the world of information technology, an endpoint is what it sounds like. It's a machine or device with which a person (the end user) accesses a company's network and the internet in general. Here are 4 endpoints you should always protect and some suggestions for keeping them safe.
Security best practices with sticky notes.

Web App Security Best Practices - 2018 Edition

Data breach costs quickly add up. They have the potential to make companies go out of business.
Web Application Security checklist.

Your Quick-Start Web Application Security Checklist

When building a web application, keeping the data of you and your customers secure should be high on your list of priorities.
GB Tech Web Application WP

6 Ways to Improve Web Application Security

Follow these 6 ways to improve web application security to keep your business, clients, and network safe.