Roger Curtis

Email Filtering Solutions

EMAIL FILTERING SOLUTIONS

Email filtering solutions are crucial for protecting individuals and organizations from a wide range of cyber threats, such as phishing, malware, and spam. Effective email filtering solutions use various techniques to identify and block malicious emails before they reach the user’s inbox. One of the most commonly used email filtering techniques is content filtering. This …

EMAIL FILTERING SOLUTIONS Read More »

CRN Security 100 2023

CRN SECURITY 100 2023

A few weeks back, Masser Technologies made the CRN’s MSP 500 list for 2023, an annual list that recognizes North American managed service providers (MSPs) and managed security service providers (MSSPs) that have proven track records of innovation and growth. As part of that award, we also made the 2023 Security 100 list highlighting cybersecurity vendors across …

CRN SECURITY 100 2023 Read More »

EDR

ENDPOINT DETECTION AND RESPONSE (EDR)

Endpoint Detection and Response (EDR) is a cybersecurity solution that provides visibility into endpoints or devices connected to an organization’s network, detects threats and suspicious activity, and provides a rapid response to prevent or mitigate potential damage. The primary goal of EDR is to provide real-time monitoring of endpoints, including laptops, desktops, servers, mobile devices, …

ENDPOINT DETECTION AND RESPONSE (EDR) Read More »

CRN MSP 500 2023

We are very honored and grateful to continue to be ranked on CRN’s MSP 500 list, an annual list that recognizes North American managed service providers (MSPs) and managed security service providers (MSSPs) that have proven track records of innovation and growth. We share this award with our employees, customers, and partners, as we wouldn’t be able …

CRN MSP 500 2023 Read More »

LOG COLLECTION

24×7 Security Monitoring (SOC)

Continuous security monitoring (24×7) through a Security Operations Center (SOC) is essential to an organization’s cybersecurity strategy. The primary function of a SOC is to monitor and analyze the security of an organization’s networks, applications, and systems in real time. This service includes detecting and responding to potential security incidents, vulnerabilities, and threats. SOCs have …

24×7 Security Monitoring (SOC) Read More »

Anti-Phishing Simulation

ANTI-PHISHING SIMULATION

Phishing is a cyber attack commonly used to steal personal or sensitive information from individuals, businesses, and organizations. An anti-phishing simulation is a training program designed to educate people about phishing attacks and help them recognize and avoid them in real life. Anti-phishing simulations typically involve sending simulated phishing emails or messages to employees, students, …

ANTI-PHISHING SIMULATION Read More »

SECURITY AWARENESS TRAINING

SECURITY AWARENESS TRAINING

Security Awareness Training In every organization, the most important assets are its people. Unfortunately, people are also the most vulnerables target of Cyber Attacks.  This is why an organization’s good cyber hygiene needs to include Security Awareness Training. Gone are the days of only worrying about protecting your organization with a firewall. Today, most cyber …

SECURITY AWARENESS TRAINING Read More »

Dark Web

DARK WEB MONITORING

The Dark Web is not part of the World Wide Web indexed by search engines, meaning its contents are not cataloged, organized, or easy to navigate. Google Chrome, Firefox, Edge, and Safari web browsers won’t allow you to access the dark web.  Dark web monitoring is a technology to sift through this normally hidden underworld …

DARK WEB MONITORING Read More »

MULTI-FACTOR AUTHENTICATION

MULTI-FACTOR AUTHENTICATION

Hackers focus on stealing usernames and passwords to your important systems with the potential of rich financial rewards. Simply relying on passwords to access essential sites and applications is no longer enough. Don’t make it easy for bad actors to steal your important data, implement Multi-Factor Authentication (MFA) to reduce the risk of being hacked. …

MULTI-FACTOR AUTHENTICATION Read More »

Password Manager

PASSWORD MANAGERS

Keeping track of all your passwords can be very daunting if you follow good password practices and don’t use the same password for all your systems. Expanding from our last post, choosing complex and unique passwords for all your systems pose a serious password management challenge that password managers can easily overcome. A Password Manager …

PASSWORD MANAGERS Read More »