Blog

Blog

What is an Incident Response Plan (IRP)?

An incident response plan is defined as the documentation of a predetermined set of instructions or procedures to detect, respond to, and limit the consequences of malicious cyber-attacks or an organization’s information systems. In shorter, simpler terms, it’s the written plan your team has to respond to specific problems with your IT systems.

Read More »

3 Ways to Boost Your Security Using Identity and Access Management (IAM)

Haters may call it alphabet soup or too confusing to care about, but here at PTG, we’re pretty keen on all of our acronyms and what they represent. Not only are there dozens of terms to remember, making these shortened versions the perfect little helper, but writing PAM instead of things like Privileged Access Management over and over again saves time and space. It's our goal to simplify these complex topics into something a little more palatable- if you will.

 

Today’s alphabet soup is a hearty helping of security from your favorite chefs in the industry. Instead of harping on MFA and EDR or even PAM for your SMB, today our IT topic may be a little longer than a TL;DR but covers an equally important topic: IAM.

Read More »

Is Privileged Access Management (PAM) Important for Small Business?

We deal with a lot of complex topics here, and our goal is always to clarify them. Privledged Access Management, or PAM for short, is one of the topics we believe all of our partners should be well-versed on no matter their line of work.

Read More »

What is Endpoint Detection Response (EDR)?

Thinking critically, and a little bit for fun, we were trying to come up with other ways “Endpoint” and EDR could be misinterpreted or misunderstood. Maybe the end of a maze, or a weird way to think about the idea of a finish line? An offshoot of the revolutionary dancing video game Dance Dance Revolution (DDR), even.

Read More »

Top 5 Reasons Small Businesses Should Use a Password Manager

While many small businesses typically opt for one login email and one password across their accounts to keep things straight, this system actually puts them at a heightened risk of compromise. Before reading any further, check to see if your password appears on the list for the top 200 most common passwords – some of our favorites include ‘monkey’, ‘pokemon’, ‘dragon’, and ‘myspace1’, though the majority are simple patterns like ‘123456’ and ‘qwerty’. 

Read More »
   
New Call-to-action

Posts by Topic

see all