kbryant

Home/Kelly Bryant

About Kelly Bryant

This author has not yet filled in any details.
So far Kelly Bryant has created 15 blog entries.

Keep Updates — Up to Date

2020-10-19T16:56:55-04:00By |

Montra Cyber Readiness 3: Keep Updates -- Up to Date October 19, 2020 Have A Cyber Readiness Plan  Establish Strict Policies and Procedures Keep Updates -- Up to Date Force Authentication   Back-Up Everything!  Don’t Neglect Compliance  Continuous Network Intelligence Security Awareness Training  Combat the Password Crisis Don’t Skip the Insurance Reduce Supply Chain Vulnerabilities   Deploy [...]

Establish Strict Policies and Procedures

2020-10-07T09:25:01-04:00By |

Montra Cyber Readiness 2: Establish Strict Policies and Procedures October 7, 2020 Have A Cyber Readiness Plan  Establish Strict Policies and Procedures Keep Updates -- Up to Date Force Authentication   Back-Up Everything!  Don’t Neglect Compliance  Continuous Network Intelligence Security Awareness Training  Combat the Password Crisis Don’t Skip the Insurance Reduce Supply Chain Vulnerabilities   Deploy a [...]

Have a Cyber Readiness Plan

2020-09-22T11:23:51-04:00By |

12 Cyber Readiness Strategies September 22, 2020 Is your business ready to handle a targeted cyber-attack? In the 2020 Thales Data Threat Report, 49% of US companies have already experienced a data breach. To enable you to become more proactive and vigilant in defending against cyber threats, Montra will review 12 Cyber Readiness Strategies to over [...]

Remote Workforce Business Continuity

2020-09-16T07:33:12-04:00By |

Ensure your Business Continuity Plan Secures your Remote Workforce September 15, 2020 In  our last Securing Remote Workers Blog, we discussed how organizations in today's world must adapt to changing business conditions to ensure a secure remote workforce. Another critical element for securing your remote workforce is ensuring your business continuity and disaster recovery plan [...]

PSAP Cyber Risks to 911

2020-09-16T08:54:16-04:00By |

CISA Report on Cyber Risks to 911: TDoS August 27, 2020 A telephony denial of service (TDoS) attack is a specific type of DDoS attack directed towards a telephone system to bring the targeted system down. These attacks can affect anyone, including our 911 infrastructure, and may often include ransomware requests.  As such, TDoS attacks [...]

Remote Workforce

2020-08-27T12:01:08-04:00By |

7 Critical Considerations for Firewall Performance in the Era of Secure Remote Work All organizations in today’s world must adapt to changing business conditions to ensure a secure remote workforce. Traditional firewalls cannot scale across multiple applications required for secure telework, placing the burden on IT teams to upgrade existing firewalls. Upgrading outdated integrated firewalls [...]

Secure Your NextGen 911 Network

2020-08-20T14:23:57-04:00By |

Protecting America's NextGen 911 Networks  NextGen 911 systems allow Public Safety Answering Point (PSAPs) and public safety agencies to deliver a more responsive service that saves lives -- yet these systems come with increased security risks due to their expanding cyber-attack surface. Hackers and cybercriminals are increasingly targeting emergency response networks throughout the country. According [...]

Montra Solutions Ranked Among World’s Most Elite 501 Managed Service Providers

2020-08-03T09:53:14-04:00By |

Annual MSP 501 Identifies Best-in-Class Global MSP Businesses & Leading Trends in Managed Services ATLANTA -- (August 2, 2020) -- Montra Solutions has been named as one of the world’s premier managed service providers on the prestigious 2020 annual Channel Futures MSP 501 rankings. For the 13th year running, MSPs from around the globe completed an [...]

4 Tips for Ensuring Compliance in the Cloud in 2020

2020-08-31T08:06:42-04:00By |

4 Tips for Ensuring Compliance in the Cloud in 2020 Cloud Computing is well understood as a great method for increasing the speed of deployment and agility of managing IT infrastructure. For these reasons, the migration to and utilization of Cloud Computing continues to grow in both large enterprises and small businesses. However, this move [...]