Blog

January 14, 2020

Potentially Serious Patch for January 14th Patch Tuesday

For the first Patch Tuesday in 2020, there is a potentially serious flaw that is being patched.  KrebsOnSecurity.com is reporting that Microsoft has already shipped patches to the US military and high value targets. It…

View Now
January 8, 2020

Journey to Public Cloud

One of the largest trends in IT seen over recent years has been public Cloud adoption. Gartner predicts that the market will reach $206.2 billion by the end of 2019. Reasons to cite for the…

View Now
December 30, 2019

2019: A Year in Review

Thrive has experienced another year of valuable growth and additional capabilities acquisitions in 2019 that will greatly benefit our near 1000 customers. As the final blog post of the year AND the decade, we will…

View Now
December 17, 2019

IoT Devices: Your Data is only as Secure as your Weakest Link

The holiday season is quickly approaching bringing us holiday joy and cheer as well as the latest IoT (Internet of Things) smart home gadgets. With this in mind, we take a deeper dive into IoT…

View Now
December 10, 2019

Protect Your Home from Cybercrime

There is a big misconception that cyber security ends when you leave your place of employment. The fact of the matter is that our new connected, and always on lives are prime targets for cyber…

View Now
December 5, 2019

How to Protect Your Business from 2019’s Worst Hacks and Vulnerabilities

“Those who fail to learn from history are condemned to repeat it.” It is critical to learn from yesterday’s vulnerabilities before they become tomorrow’s hacks. It is through this lens that we look back on…

View Now
November 21, 2019

User Education is Critical to Fending Off Cyber-Attacks

Cyber threats are currently top of mind for stakeholders in every vertical. Our consulting team is fielding many requests for Security Health Assessments (SHA) to help organizations better understand their current risk profile and identify…

View Now
October 22, 2019

The Cyber Security Threat Predicted to be the Most Costly in 2020 & Six Steps to Prevent It

Most organizations are either familiar with, or have been victimized by, a Business Email Compromise (BEC).  A BEC is a type of scam targeting organizations with the goal of leveraging a compromised email account to…

View Now
October 15, 2019

Enable Two-Factor Authentication

If you talk to any security expert about securing online accounts, the first thing they will tell you is “enable 2FA.” However if you start looking at the number of accounts where Two-Factor Authentication is…

View Now
October 8, 2019

Focus on the Basics

I was meeting with a company the other day, and security was naturally brought up. In their opinion, they felt that they had a good handle on security and their overall network — they perform security awareness training, they have a SIEM solution, they have AD monitoring and firewall monitoring, and a plethora of other items that would keep their business safe. Digging in deeper I started asking about what types of incidents they got notified for, and how do they get notified? That was when I realized that they were trying to do everything correctly, but they didn’t actually have the manpower to do everything they wanted.

View Now