Is there a hole in your network security? Unless you’re using an application whitelisting service like ThreatLocker, the answer is “yes”. OTM has witnessed ransomware events that have locked up “protected” networks. Despite implementation of standard security measures including a full featured firewall, email filtering, and endpoint protection, successful attacks used compromised user and administrator…Read more
Why have a managed firewall (UTM)? 4 reasons.
We’ve seen it happen. Maybe the person responsible for your company’s IT and firewall management recently retired or left. No one else really ever had to pay much attention to this stuff, so what happens now? Actually, the term “firewall” is dated. If you’re doing it right, it’s actually a Universal Threat Management (UTM) security…Read more
5 Tips for Detecting and Avoiding a Phishing Attack
Ever wonder why Carmen and Ken get way more malware alerts than any other user on your network? Are they loose cannons creating preventable problems for you? There are a few ways for you to help get this under control. It turns out some people are pretty gullible when it comes to email, because after…Read more
Is someone getting fake email from you?
“Someone has hacked our email!” We frequently hear from administrators and users freaked out because their contacts are receiving janky email that looks like it’s from them or their company when it most definitely isn’t. Usually that bogus email also includes a link that is oddly and irresistibly compelling for the recipient to click. A…Read more