In 2013, the National Institute of Standards and Technology (NIST) was directed to create a “voluntary framework—based on existing standards, guidelines, and practices — for reducing cyber risks to critical infrastructure.”   Government agencies and contractors were required to implement cybersecurity programs defined in NIST Special Publications...

Cyber Essentials is a UK government-based scheme that helps participating organizations protect themselves, regardless of size, against a range of common cyberattacks.  Cyberattacks come in many shapes and sizes, but the vast majority are very basic in nature, carried out by relatively unskilled individuals. They’re the...

Network assessments are a unique and effective offering under the “network security” umbrella. A network assessment tool doesn’t simply monitor a network like RMM software does. It provides ongoing network “snapshots,” which help identify patterns and behaviors that can predict a breach. It’s a more...

Businesses today operate with significantly larger and more complex networks than ever before. BYOD policies, SaaS applications and hybrid/remote workforces have further propelled this paradigm shift. All of this makes it more challenging for managed service providers (MSPs) to gain the required visibility into client...

Our team occasionally encounters questions about the difference between network assessment tools and remote monitoring and management (RMM) software. “Why would/should we add an IT assessment solution?” clients ask. “We have an RMM to keep an eye on our networks.”  This is a common misconception that could...