Critical Log4j Vulnerability Update
The critical vulnerability identified as CVE-2021-44228, affects the Java logging package Log4j. Apache’s Log4j is used across the Internet as a tool for logging changes in applications and software. The […] [...]
The critical vulnerability identified as CVE-2021-44228, affects the Java logging package Log4j. Apache’s Log4j is used across the Internet as a tool for logging changes in applications and software. The […] [...]
The theft of intellectual property and sensitive information undermines our nation’s defense posture and economy. U.S. costs last year are estimated at $225 to $600 billion (source: CMMC-AB and LegalJobs.io) […] [...]
The holiday season is here and many of us are looking forward to some time off to spend with our families. But hackers don’t take time off during the holidays. […] [...]
Most organizations don’t have a solid plan for how to recover operations when disaster strikes. Natural disasters such as hurricanes, tornadoes and snow storms can take out a building at […] [...]
Tego announced today that Greg Manson has joined the organization as Vice President of Security, Audit, and Compliance. Manson will oversee the department, projects, and organizational initiatives. “Greg is a […] [...]
Security is a state of mind. With the increasing number of cyberattacks and breaches, security must be embedded into every aspect of your organization. In order to build a culture […] [...]
According to the Verizon 2021 Data Breach Investigations Report, phishing attacks are responsible for the vast majority of breaches via social engineering. The sophistication and frequency of these attacks have […] [...]
Achievement Will Expand Tego’s Security Offerings to Organizations in DoD Space Today we are are proud to announce we are authorized as a Cybersecurity Maturity Model Certification (CMMC) Registered Provider […] [...]
This is the second post in a two-part blog series with input provided by Chad Spears, Director of NSOC Operations at InfusionPoints. We’ve previously shared five questions to ask when […] [...]
Passwords are required for everything you log in to these days: your computer, your bank, your email, and more. It may be tempting to use the same password or a […] [...]