Cyber Security

December 29, 2020
Top 2021 Cybersecurity Predictions

2021 Cybersecurity Predictions: Remote Work, Phishing, Ransomware, & More Adapting to an ever-evolving digital and physical threat landscape is vital for all businesses. However, in the...

Read More
December 15, 2020
A Day in the life at MPG: Cybersecurity Analyst

cybersecurity a

Read More
December 4, 2020
FedRAMP, FISMA, and SOC 2… What’s the Difference?

FedRAMP vs. FISMA vs. SOC 2: Similarities and Differences FISMA, FedRAMP, and SOC 2 are common IT Security terms, often bandied around interchangeably by...

Read More
October 5, 2020
Phishing & Elections: 4 Ways to Protect Your Data During Election Season

Elections & Phishing: A Susceptible Population Some people associate elections with excitement and drama. Which candidate will win?  Which candidate...

Read More
October 1, 2020
Public Sector on Air: Cybersecurity, Compliance, & Automation with Red Hat

Public Sector on Air features Red Hatters, partners, and customers from public sector entities talking about common problems that need...

Read More
September 15, 2020
How to Protect Your SIM Card from Hackers

What is SIM Card Hacking? Sim Card Hacking, also known as a SIM Swap Attack, SIM Port Hacking, or SIM...

Read More
June 2, 2020
What’s the difference between Pen Testing, Red Teaming, and Threat Hunting?

At first glance, it seems like pen testing, red teaming, and threat hunting all seem like a fancy way of saying the...

Read More
April 28, 2020
How to Hack Through a Pass-Back Attack: MFP Hacking Guide

A Pen Tester’s Guide to Printer Hacking What is an MFP and MFP Hacking anyway? Multi-Function Peripherals (MFPs) are an...

Read More
April 21, 2020
Security Baseline and Compliance Automation Webinar

How to Overcome Compliance Barriers with Security Automation Webinar Overview: We’ll be honest with you, compliance is hard. Between shifting...

Read More
March 20, 2020
4 Ways to increase your security ROI with automation

How and why you should use automation to enforce security compliance  Enterprise IT is a vast network of highly varied, distributed...

Read More
March 20, 2020
A Day in the Life of a Cybersecurity Recruiter at MindPoint Group

A Day in the Life of a Cybersecurity Recruiter This month we talked with Mindy Vo, one of our Cybersecurity...

Read More
March 2, 2020
6 Ways to Get Started with Your Fourth-Party Vendor Program

6 Ways to Get Started with Your Fourth-Party Vendor Program What is Fourth-Party Vendor Risk Management?  According to expert studies, more than...

Read More
12 3 4