Read up on managed security services
Below you will find blog articles covering many different security issues, helping you stay up-to-date with the latest security information. Click the article links to start expanding your security intelligence…
Analyze your present security set up for vulnerabilities and identify necessary improvements, and fixes to problems.
Protect your network BEFORE you have an incident and use our security monitoring & management expertise to establish a watertight intrusion detection system (IDS).
Hackers are scanning your network — shouldn’t you be too? We can help you scan, clean up, and protect yourself against future attacks.
Do you need a penetration test or 'Pen Test'? Find out about Roka's penetration testing service, performed by a highly skilled team of ethical hackers.
Below you will find blog articles covering many different security issues, helping you stay up-to-date with the latest security information. Click the article links to start expanding your security intelligence…
Last year the top cyber security threats changed dramatically. And 2018 will be no different. Except we are going to see even craftier ways for hackers to make money off of you! Below we will predict and discuss the new threats you will encounter in 2018: Money vs Mayhem Browser based Crypto Currency Miners Ransomware […]
The term Vulnerability Assessment is often thrown around for a variety of cyber security procedures. While it is an industry term that encompasses a large area, it’s less complicated than most “experts” make it. Today, we’ll walk through what you need to know about Vulnerability Assessments to get started and answer these questions: What is […]
You need a Penetration Test or “Pen Test!” You’ve heard you need one for compliance, or someone just thinks it’s a good idea. Where do you start? Should you hire a firm or try it with your current staff, and what do you actually need out of a Pen Test? Is your network secure and […]
I think most of us will agree: Ransomware is one of the largest security threats to your enterprise network. Even with ransomware evolving, there are steps you can take to prevent it from encrypting files and spreading through your network. In today’s article we will walk through 5 ways to combat ransomware: Perform Phishing Email […]