Cyber Security

Summit 360 Announces ITAD Certification

Minneapolis metro-area company becomes only 2nd company worldwide to secure the select R2v3 Certification EAGAN, MN — August 3, 2021 — Summit 360, a technology refurbisher and IT Asset Disposition (ITAD) company, joins a global, select group as an early adopter of the R2v3 certification program: the comprehensive, voluntary industry [...]

Preparing for the Next Big Exploit

An exploit is a type of cyberattack that capitalizes on vulnerabilities in applications, networks, or hardware. It is usually introduced into code during development and is unknown to software vendors, researchers, and the public. Once identified, exploits are categorized according to the type of vulnerability they exploit, such as zero-day, [...]

By |2019-09-12T15:39:14-05:00September 11, 2019|Cyber Security|

Choosing the Right Firewall

Your firewall protects your internal network from the public internet. It is the first line of defense to stop intrusions and malicious attacks from entering your network. The manufacturer of the firewall hardware provides definition files. The firewall scans the network using these definition files, which provide patterns for normal [...]

By |2019-06-25T21:42:22-05:00May 29, 2019|Cyber Security|

Vulnerability Scanning 101

Protecting your network is an essential part of network maintenance. One of the ways you can keep your network safe is by performing regular vulnerability scans. A vulnerability scan is an assessment that checks for vulnerabilities, or weak spots, in your computer, server, network, or infrastructure. How Does it Work? [...]

By |2019-04-24T22:42:54-05:00April 29, 2019|Cyber Security|
Go to Top