Search
Generic filters
Skip to content

Archived Cybersecurity Blogs

Filter by category:
Search
Generic filters
Secure Video Conferencing: Dos and Don’ts

Perform a detailed video conferencing security assessment to ensure your virtual meetings are safe and secure.

It’s been some time now since we all had to begin holding every one of our meetings online, and I’m afraid many organizations are not paying sufficient attention to video conferencing security

Jon Bolden

Why Distributed Denial of Service (DDoS) Attacks Have Become More Dangerous

How much risk can you endure if you are hit by a Distributed Denial-of Service (DDoS) attack? Assess your current situation now. Over the past month, I worked with both the FBI and the California Highway Patrol on a Distributed Denial-of-Service (DDoS) attack against an organization. This has become such a common problem that the FBI’s cyber task force is starting to lean on other agencies that have the capability or resources to help. In years past, DDoS attacks were

Jon Bolden

Cybersecurity Defense: Three Critical Components to Protect your Organization

Cybercriminals are overwhelming executives and tech staff. Don’t be afraid to get help. With cybercriminals becoming more and more sophisticated and malware attacks, phishing and social-engineering scams multiplying, even the most diligent executives and tech teams with the best tools, processes, and budgets can be easily overwhelmed. This is not the fault of any individual or department—just a fact of business when faced with 24/7 cybersecurity attacks. It’s at these difficult times that people call us, and when they do,

Jon Bolden

Seven Steps to Prevent a Cybersecurity Catastrophe

A proactive cybersecurity plan is your best bet for surviving an attack

Even before the pandemic arrived and forced companies to overhaul their business practices overnight, cybersecurity professionals discovered that we were witnessing a crime wave. The proliferation of remote work, which dispersed our employees along with our workstations and networks, has markedly accelerated it.

You have no time to lose—the sooner you strengthen your cybersecurity position the better off you’ll be when you’re attacked

Jon Bolden

Contact Quest Today  ˄
close slider