Petra Technologies, Inc.'s Blog

Petra Technologies, Inc.
(503) 363-2693
4.9/5 based on 7 Reviews

Group Policy Objects and Active Directory

When it comes to cybersecurity, it is not an exaggeration to say that a simple user error can open a gateway for a cyber attack on your business or organization. For example, an employee could click …
Petra Technologies, Inc.
(503) 363-2693
4.9/5 based on 7 Reviews

Cleaning Up Unused Programs

Although it’s a little early to be spring cleaning, it is generally a good idea to “clean up” the unused programs and applications in your digital home, such as a computer or a work phone. E…
Petra Technologies, Inc.
(503) 363-2693
4.9/5 based on 7 Reviews

SIEM vs. EDR

Now that we’ve covered Security Incident and Event Management (SIEM) and Endpoint Detection and Response (EDR) in previous videos, you might be wondering which solution is best for your busines…
Petra Technologies, Inc.
(503) 363-2693
4.9/5 based on 7 Reviews

Security Incident and Event Management (SIEM)

When it comes to protecting the security of your business, having accurate, complete, and accessible data is crucial for identifying potentially malicious activity. That’s where Security Incident a…
Petra Technologies, Inc.
(503) 363-2693
4.9/5 based on 7 Reviews

System Auditing

While the word “audit” or “auditing” can have a negative connotation (hello IRS!), auditing can be a proactive cybersecurity strategy. In fact, system auditing is #13 on Petra Tech’s Cybers…
Petra Technologies, Inc.
(503) 363-2693
4.9/5 based on 7 Reviews

Identifying Digital Assets

As the world becomes increasingly digital, businesses are relying on more and more digital assets to operate. From website content and social media accounts to customer data and company records, digi…
Petra Technologies, Inc.
(503) 363-2693
4.9/5 based on 7 Reviews

The Visitor Program

Does your place of work have a policy for when visitors arrive? Whether your business deals with walk-ins, vendor deliveries, or client meetings, it is a good idea to keep a record of all visitors. …
Petra Technologies, Inc.
(503) 363-2693
4.9/5 based on 7 Reviews

Clean Desk Policy

When it comes to data security, managed IT firms (like Petra Technologies) are typically focused on the security of digital assets and what you might do online to compromise security – actions like…
Petra Technologies, Inc.
(503) 363-2693
4.9/5 based on 7 Reviews

Here's What You Need To Know About Phishing

As technology advances, more private and business data is stored on digital devices and the internet To properly keep those assets secure, it is also important to be aware of the advancements of cybe…
Petra Technologies, Inc.
(503) 363-2693
4.9/5 based on 7 Reviews

Internal Policy for Data Retention

When your business or organization experiences a breach of security or loss of data, how soon can your business get back up and running? If you are prepared enough to have backups of your data… how…