Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Cleaning Up Unused Programs
Although it’s a little early to be spring cleaning, it is generally a good idea to “clean up” the unused programs and applications in your digital home, such as a computer or a work phone. E…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
SIEM vs. EDR
Now that we’ve covered Security Incident and Event Management (SIEM) and Endpoint Detection and Response (EDR) in previous videos, you might be wondering which solution is best for your busines…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Security Incident and Event Management (SIEM)
When it comes to protecting the security of your business, having accurate, complete, and accessible data is crucial for identifying potentially malicious activity. That’s where Security Incident a…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
System Auditing
While the word “audit” or “auditing” can have a negative connotation (hello IRS!), auditing can be a proactive cybersecurity strategy. In fact, system auditing is #13 on Petra Tech’s Cybers…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Identifying Digital Assets
As the world becomes increasingly digital, businesses are relying on more and more digital assets to operate. From website content and social media accounts to customer data and company records, digi…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
The Visitor Program
Does your place of work have a policy for when visitors arrive? Whether your business deals with walk-ins, vendor deliveries, or client meetings, it is a good idea to keep a record of all visitors. …
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Clean Desk Policy
When it comes to data security, managed IT firms (like Petra Technologies) are typically focused on the security of digital assets and what you might do online to compromise security – actions like…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Here's What You Need To Know About Phishing
As technology advances, more private and business data is stored on digital devices and the internet To properly keep those assets secure, it is also important to be aware of the advancements of cybe…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Internal Policy for Data Retention
When your business or organization experiences a breach of security or loss of data, how soon can your business get back up and running? If you are prepared enough to have backups of your data… how…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Employee Training on the Privacy Policy
Now that you know the importance of having a company internal privacy policy what is the next step? Tell people about it! Specifically, informing employees that the policy exists, and what …
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Internal Privacy Policy
One of the first things you can do when going into business (and consequently, #1 on our Cybersecurity Essentials Checklist) is to create an internal privacy policy. As the name suggests, the inte…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
The Cybersecurity Essentials
When you consider the necessary cybersecurity essentials and steps you take to protect your business from ransomware and hackers, how many can you name? Are you thinking about private wifi? Dat…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Security Cameras
Security cameras—especially wireless ones—have become a crucial element in ensuring the safety of your home or business. However, as with any internet-enabled technology, they can be vulnerab…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Recapping a Cybersecurity Article from Forbes
Here at Petra Technologies, we could talk all day about the importance of cybersecurity for your business or organization. So when a company like Forbes makes a contribution to this space, we want to…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Keeping Your Mobile Device Secure
In today's world, mobile devices are so much more than just communication tools; they hold all our important information, including bank account details, personal photos, and business emails. Man…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
How to Check if a Healthcare Agency Has Been Breached
If you've been getting more spam emails recently, you might've been one of the thousands of people whose personal information was stolen in a recent hack of a larger company—such as the NBA or Ferr…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Network Security in Your Home
A recent CNET article (linked here: https://www.cnet.com/home/internet/stop-home-network-hackers-top-10-tips-to-protect-your-wi-fi-security/) cites that in 2021, “internet crime cost Americans…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews
Threat Intelligence
While it’s clear that cyber threats and the motivations behind them are evolving quickly, the tools and techniques of bad actors are not. This is where threat intelligence comes in. Threat intel…
Petra Technologies, Inc.
(503) 363-2693 4.9/5 based on 7 Reviews
(503) 363-2693 4.9/5 based on 7 Reviews