Petra Technologies, Inc.'s Blog
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Group Policy Objects and Active Directory
When it comes to cybersecurity, it is not an exaggeration to say that a simple user error can open a gateway for a cyber attack on your business or organization. For example, an employee could click …
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Cleaning Up Unused Programs
Although it’s a little early to be spring cleaning, it is generally a good idea to “clean up” the unused programs and applications in your digital home, such as a computer or a work phone. E…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
SIEM vs. EDR
Now that we’ve covered Security Incident and Event Management (SIEM) and Endpoint Detection and Response (EDR) in previous videos, you might be wondering which solution is best for your busines…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Security Incident and Event Management (SIEM)
When it comes to protecting the security of your business, having accurate, complete, and accessible data is crucial for identifying potentially malicious activity. That’s where Security Incident a…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
System Auditing
While the word “audit” or “auditing” can have a negative connotation (hello IRS!), auditing can be a proactive cybersecurity strategy. In fact, system auditing is #13 on Petra Tech’s Cybers…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Identifying Digital Assets
As the world becomes increasingly digital, businesses are relying on more and more digital assets to operate. From website content and social media accounts to customer data and company records, digi…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
The Visitor Program
Does your place of work have a policy for when visitors arrive? Whether your business deals with walk-ins, vendor deliveries, or client meetings, it is a good idea to keep a record of all visitors. …
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Clean Desk Policy
When it comes to data security, managed IT firms (like Petra Technologies) are typically focused on the security of digital assets and what you might do online to compromise security – actions like…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Here's What You Need To Know About Phishing
As technology advances, more private and business data is stored on digital devices and the internet To properly keep those assets secure, it is also important to be aware of the advancements of cybe…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews