Cookies, Presents and Identity Theft?

How to survive the season of phishing attacks Cookies, presents, full parking lots and the endless stream marketing emails selling you the best deal. It’s those little things that make the holiday season what it is.  What isn’t in the holiday spirit are hackers and phishing campaigns stealing personal and financial information.  No one is asking…

Read More

The First Building Block of a Strong Cybersecurity Plan

The First Building Blocks of a strong security plan|

by Justin Smith – Brite, President and COO An effective cybersecurity plan is an intricate web of tools and systems working together.  From firewalls and endpoints to on-premise technology and the cloud, the security footprint is expanding and when it comes to securing it you have to start somewhere.  The somewhere? Visibility. Why do you…

Read More

3 Misconceptions About Managed Service Providers

3 Misconceptions About Managed Service Providers

As an MSP engineer for the past 10 years, I would like to dispel some of the top misconceptions about managed service providers. Companies seem to be leery of making the leap to using a managed service provider (MSP) for their company’s IT due to misconceptions and fears. With the rapid rate that business technologies…

Read More

Securing a Network: Forescout’s Core Capabilities

A problem that plagues organization’s capability to achieve complete endpoint protection is the inability to identify every device connected to the network.  In other words, organizations struggle to achieve full visibility.  To help solve that problem, Forescout Technologies revolutionized device visibility with a proven process attained through agentless visibility.     As discussed in this post, device visibility is essential to…

Read More

Securing a Network: Agentless Visibility

In order to successfully secure a network, it requires multiple, simultaneous steps ranging from endpoint protection to managing a SIEM.  However, the simple fact is that a network cannot be fully secure if there are unknown connected devices or applications.  Therefore, gaining full visibility of the threat landscape is a critical component in combating the ever-evolving threat landscape.  …

Read More

The Use of Video by Law Enforcement

To keep the public safe, law enforcement agencies have always relied on the latest technology.  Each decade of the 1900s can be marked by the introduction of a critical investigative technology.  1900s: The introduction of fingerprinting  1920s: The introduction of the polygraph machine  1930s: The introduction of two-way radios  1940s: Radar detectors used to capture vehicle speeds  1950s: Electronic data processing machines summarized arrests and warrants  1960s: The introduction…

Read More

Tips for Choosing the Right Device for Mobile Wireless Connection

Need help choosing the correct device for mobile connectivity? The mobile work force relies heavily on cellular connectivity to provide internet access anywhere in the field. It is especially important that these workers are connected at all times. Police officers are in their vehicles for a majority of their shift and being connected to dispatch…

Read More

Body Worn Cameras: All Angles to Consider

In today’s blog Lindsey Cooksey, Brite’s Eastern  Public Safety Manager, touches on major points most have overlooked with Body Worn Camera technology. Body Worn Cameras (BWC) are the latest hot topic technology being called for and implemented as part of a police officer’s uniform. With recent shootings and other officer involved incidents sparking outcry from communities…

Read More

Why Organizations Should Look at Penetration Testing

Today’s blog is brought to you by Todd Palma.  Todd brings over a decade of technology sales experience to Brite.  Through working with organizations of all shapes and sizes, he has been able to identify and respond to market place trends.   Hackers and cyber thieves are getting more creative every day in an effort…

Read More

Endpoint Security: Everybody Needs Something

Cyber-attacks have become the norm. Organizations are aware of the ongoing threats day in and day out, but there is an undeniably scary trend. Prevention of attacks should be the priority, but too many organizations wait until they have been breached to implement the correct security tools. The question is, why is this happening and…

Read More