• Security

Tektonika Staff October 15, 2019 4 Minute Read

Vulnerability assessment vs penetration testing: Which is right fo…

Vulnerability assessment vs penetration testing—these terms are often used interchangeably, but they each have distinct benefits to offer.

Carrie Dagenhard October 14, 2019 4 minute read

An IT leader’s guide to serverless computing

What are the advantages of serverless computing for IT? Could the tech impact your security? Here's some helpful background on this popular service.

Alex Holland October 11, 2019 12 Minute Read

Buran Ransomware Targets German Organizations Through Malicious Sp…

As of October 2019, commodity ransomware campaigns conducted by financially motivated threat actors pose a significant threat to organizations. The three disti…

Jasmine W. Gordon October 10, 2019 4 minute read

4 IT disaster recovery strategies for small government agencies

When a disaster comes to your small government office, are you ready? Discover 4 IT disaster recovery strategies to prepare for hacks or natural disaster.

Rose de Fremery October 9, 2019 5 minute read

A CIO’s guide to strengthening network access control

Here's how CIOs can ensure proper network access control and still enable employee productivity.

Rose de Fremery September 24, 2019 4 minute read

Know your certifications: What is ISO 12647?

You've heard of ISO 27001, but have you run into ISO 12647 before? Here's a brief primer on one of the less common ISO certifications.

Rose de Fremery September 19, 2019 4 minute read

3 steps for improving network security with better cyber hygiene

Improving network security starts with ensuring proper cyber hygiene. Help your employees protect themselves and your business with these three pro tips.