Penetration testing, Chicken Guns, and Mike Tyson

Penetration testing, Chicken Guns, and Mike Tyson

Here at OnX, we do quite a few pentests every year. I’ll note for my readers that the term is an abbreviation for penetration tests. It’s funny how many folks think the “pen” is an acronym and spell it as “PEN test,”. So let your friendly neighborhood pentester set...
Your Quick Guide to Conducting Secure Videoconferences

Your Quick Guide to Conducting Secure Videoconferences

Back view of Asian business woman talking to her colleagues about plan in video conference. Multiethnic business team using computer for a online meeting in video call. Group of people smart working from home. Chances are you have just been thrust into the throes of...
How a VPN protects your privacy

How a VPN protects your privacy

Virtual Private Network (VPN) Transacting on an unsecured network means you could be exposing your private information. VPN services establish secure and encrypted connections to provide greater privacy than even a secured Wi-Fi hotspot. That’s why a virtual private...
Why Businesses Need Endpoint Protection

Why Businesses Need Endpoint Protection

Endpoint protection platforms (EPP): Endpoint protection, or endpoint security, describes cybersecurity services for network endpoints, like laptops, desktops, smartphones, tablets, servers, and virtual environments. These services may include next-generation...