With the proliferation of both small and high-profile breaches occurring globally, it is vital to identify and diagnose security vulnerabilities in your company’s IT infrastructure and assets before a breach or intrusion takes place. Penetration testing, also sometimes called 3rd. party pen testing when done by an outside firm, offers real-world, real-time analysis to determine […]

Protect yourself and network from the Fireball Malware Malware is increasingly being used by scammers to generate huge profits, and if the recent Fireball malware is any indication, scammers are more sophisticated than ever. The Fireball malware hijacks your web browser, changing your homepage and default search engine while preventing you from changing them back. […]

It’s enough to make you want to… well, you know. The WannaCry virus has wreaked havoc across the globe, shutting down hospitals in the UK, seizing control of displays at train stations, and causing billions in damages across 150 countries. Many organizations paid ransoms of $300 to $600 per PC in bitcoin to regain control […]

Here an issue that we are starting to hear more about for clients in the NJ and NY areas where we are providing IT security / Cybersecurity services and consulting.  If fact, we’ve dealt with it internally here at our NJ offices. The Basics Hashing is the transformation of a string of characters into a […]

This year, we launched BOUNDARY, and we’re quite excited about it.  BOUNDARY is our SonicWALL firewall-as-a-service offering (FWaaS) which allows organizations to consume their firewalls as a monthly operational expense, as opposed to a one-time or periodic capital expenditure. Why firewall-as-a-service?  A radically different threat landscape has caused IT pros and business leaders to change […]

Over the past several days we have seen a huge uptick in the number of wire transfer CEO-fraud emails and this threat continues to grow.  We have firsthand knowledge of losses exceeding $100,000.00.  It’s important to note that this is a social engineering exploit and does not carry any viral infections or malware payloads.  You […]

Eric Burke, our VP of Technology and SonicWALL expert shows off his SonicWALL firewall expertise in detailing how to block traffic to or from LAN to WAN and LAN to VPN in this detailed video.  Feel free to comment. Daniel HaureyDaniel Haurey Jr. is the president and founder of managed IT services provider Exigent Technologies, […]

Online services have moved to protect your privacy by encrypting the data you send and receive across the internet.  While this does keep your data from prying eyes, it also opens up an avenue for new threats to pass under the radar.  You hear us at Exigent talk about layered threat protection all of the […]

Many businesses have built digital fortresses around themselves in the form of firewalls, a reassuring name that suggests a high level of protection. So it’s alarming that ransomware attacks seem to be skirting this important security layer with ease, stopping businesses in their tracks and incurring hundreds or thousands in damages. One recent attack infiltrated […]

The bad-guys are getting smarter, taking advantage of tactics used by criminals for centuries.  Ransom and extortion have long been used due to the way they invoke very personal feelings of dread and loss.  We all know it’s bad to give money to bad people who’ve done bad things, but nonetheless it’s a very effective […]