12/30

2021

Network firewalls have gotten better and better at blocking risks. They do their job almost 100% of the time. But, when that 1-in-a-million threat makes it past security and wreaks havoc on your data, the firewall is not enough to protect your business. What will you do then? Usually, the answer is to restore your […]

Continue Reading

11/30

2021

LATG is proud to announce that we have achieved Dell Gold partnership status. We look forward to continuing to grow the LATG Dell Technologies partnership. Our engineers can implement Dell solutions to support and grow our customers’ business in the right direction.

Continue Reading

09/24

2021

Microsoft Exchange Autodiscover protocol found leaking hundreds of thousands of credentials. Email clients fail over to unexpected domains if they can’t find the right resources Exchange’s Autodiscover protocol, specifically the version based on POX XML, provides a way for client applications to obtain the configuration data necessary to communicate with the Exchange server. It gets […]

Continue Reading

09/21

2021

Epik data breach impacts 15 million users, including non-customers Epik, the domain registrar known for hosting several large organizations, has confirmed a hack of its systems, a week after attackers branding themselves with the Anonymous hacktivist collective label said that the group had obtained and leaked gigabits of data from the hosting company, including 15 […]

Continue Reading

09/20

2021

The article below is made possible by our Security Partner Fortinet.  Ransomware is the hottest topic of the day. Every company needs to have a solid ransomware strategy in place. This is no surprise, as Fortinet’s FortiGuard Labs reported a more than 10X increase in ransomware activity in the last year. Resiliency and response are key. The industry average […]

Continue Reading

09/02

2021

The article below is made possible by our Security Partner Fortinet Phishing Definition A phishing attack is a type of cybersecurity threat that targets users directly through email, text, or direct messages. During one of these scams, the attacker will pose as a trusted contact to steal data like login, account numbers, and credit card […]

Continue Reading

Let’s work together to find the right technology solution for your organization.

504-304-2505 or Contact Us