Access Control
This morning our colleagues over at IT Simplified and I were having a conversation about a Technology Service Provider (TSP) whose data is available for sale in about 12 days on the dark web. This company per their website provides services to the government from across its multiple locations in VA, an area with many […]
Read MoreKontinuum is aware of the Solarwinds Cyber Attack security incident impacting numerous government departments in the United States and abroad. The Solarwinds Cyber Attack security incident in question, has brought to light a vulnerability in the Solarwinds Orion product. Kontinuum does not use Solarwinds Orion or any other Solarwinds product(s). Once a security incident is […]
Read MoreYour current situation. You have a guy that does your I.T. or one of your employees has been saddled with the responsibility. And this “guy” helps you find the cheapest possible solutions to keep your family safe. Yes your family, after-all what would happen to your family if your company lost all of its data […]
Read MoreWhether it be cloud, mobile, or on-premises, every technology you use stores confidential data that are accessed by your employees. So how do you guarantee the safety of said data from cyberthreats like identity theft, phishing attacks, and more? Identity and access management (IAM) is the answer, and here’s why. What is IAM? Identity and […]
Read More