What Is SSL?

Written by: Daniel Grayson Technology Business Engineer NET Xperts LLC SSL or “Secure Sockets Layer” is a security protocol that ensures data passed between a web browser and a website is private. If you have ever noticed the “s” in https in the first part of a website address, this means your connection to a website is secure, and any […]

Benefits of Cloud Migration

Written by: David Angotti Cloud Services Administrator NET Xperts LLC Cloud – It’s one of the growing industries in the technology field that still has some confusion lingering around its concept. What are the major benefits? What is the comparison of cost, security, or availability? Let’s go over some of that…                   Security: When provided by one of the […]

Senior Living Center’s Cybersecurity Threats

Written by: Britnee Schneck Marketing Coordinator NET Xperts LLC According to Forbes, more than 90% of all healthcare organizations reported at least one security breach in the last three years and senior living centers are among the most vulnerable of these organizations. Most prevalent threats senior living centers face: Phishing Attacks – These attacks typically target individuals within an organization […]

Identity Management Day 2021

Written by: Britnee Schneck Marketing Coordinator NET Xperts LLC Identity Management Day is a brand new annual awareness event that was created by the National Cybersecurity Alliance and the Identity Defined Security Alliance (IDSA). The purpose is to bring awareness about properly securing identities and access credentials within your business. A report sponsored by the IDSA shows that 94% of […]

Traditional Anti-Virus vs. EDR

Written by: Cody Sheldon Managed Services Lead Administrator NET Xperts LLC When looking to secure your business’ endpoints, there are two types of software that you can choose from: Traditional Anti-Virus (AV), which will prevent and detect basic malware infections, and Endpoint Detection and Response (EDR), which is an advanced level of protection against these types of threats.  Most AV software relies upon virus signature files […]