Petra Technologies, Inc.'s Blog
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Secure VPN
When browsing the internet on various networks, you want to make sure your traffic is safe and private—especially when it comes to activities like mobile banking or accessing sensitive information.…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Working with a Trusted Partner to Manage and Monitor Your Network
As cyberattacks have increased in number and sophistication, many small businesses no longer have the time or resources to address security issues effectively. That’s why it can be essential to …
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Incident Response Roles and Responsibilities
In a team sport, such as basketball or football, each player knowing their role—and their teammates’ roles—in a high-stakes situation can be the difference between winning and losing. In the…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Incident Response Procedures
If a cyber security incident strikes your organization, it's best to already have a plan in place. In our last video, Chris went over the importance of having an incident response policy to outline s…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Incident Response Policy
When you’re driving with your family, it’s good practice to have an emergency kit in your vehicle and go over the plan in case of an incident. If anything happens, the whole family knows what to …
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Vulnerability Management Program
Software applications like Teams, Zoom, Dropbox, and QuickBooks (to name just a few) are popular tools to help businesses run smoothly, from day-to-day operations to industry-specific projects. H…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Vulnerability Analysis & Resolution Strategy
Vulnerability analysis and management is a fundamental part of determining an organization’s overall risk—and it plays a major role in recognizing current and potential weaknesses. This proact…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
SD-Wan (Software-Defined Wide Area Network)
SD-WAN (or Software-Defined Wide Area Network) is a technology that uses Software-defined networking (SDN) concepts to provide software-based control over a wide area network connection (WAN). For…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Two-Factor Authentication (2FA) for Facebook
You've probably seen the posts circulating on Facebook that say, "My account got hacked!" or "Don't accept this friend request from me, it's a fake account!" In the first instance, enabling two-f…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews