danny@rivetry.studio

Passwordless Logins and How They Help Secure Your Business

Introduction Passwords can be the weakest link for any business. It takes just one compromised password to bring an entire organization to its knees. Passwords can be shared, forgotten, hacked, or stolen. Passwordless logins address this problem and can decrease the chances of a potential hack. Here’s what users should know about passwordless logins, how …

Passwordless Logins and How They Help Secure Your Business Read More »

How to Identify a “Smishing” Attempt on Your Smartphone

Introduction Have you been receiving texts from political candidates, manufacturers, insurance companies, fundraising campaigns, or any other strange messages? If so, you’re probably scratching your head wondering how they got your phone number because you know for a fact that you have never sent them texts before. There’s a simple explanation for those unexplained texts. …

How to Identify a “Smishing” Attempt on Your Smartphone Read More »

8 Important factors every business owner needs to know about when moving to the cloud

Introduction This document outlines the steps required to migrate your business to the cloud. Please note that not all IT providers have the same methodology, so some of the details here may conflict with the viewpoint of your current IT provider. As ever we suggest, when you are thinking of moving any of your business, …

8 Important factors every business owner needs to know about when moving to the cloud Read More »

SSVM Gold Case Study

Introduction Secutor’s Signature Vulnerability Management (SSVM) system is a unique approach to Vulnerability Management. Secutor learns and assesses the security components that consist of and make up the security architecture of our client’s network.   We review technical information about existing security components like firewalls, intrusion detection and prevention, malware analysis, and especially existing Vulnerability Management …

SSVM Gold Case Study Read More »

Virtually Secure: How Can a vCISO Help Protect Your Network | 6clicks Webinar

With the threat landscape growing by the hour, the role of CISO has never been more important. Yet high demand and massive turnover has led to outsourcing and the opportunity to engage a vCISO. So, what exactly is a vCISO and how can it benefit you? Watch this session with industry leaders as they answer …

Virtually Secure: How Can a vCISO Help Protect Your Network | 6clicks Webinar Read More »

Ransomware: 2021 Stats and Tips for Protecting Your Organization

37% of Orgs Said They Were the Victim of Ransomware In 2021 While ransomware has become increasingly common, less than 10% of the companies victimized claimed to lose money. That’s a good thing, as it indicates that while ransomware attacks may be on the rise, it also illustrates that businesses have headed the warnings and …

Ransomware: 2021 Stats and Tips for Protecting Your Organization Read More »

Do you Have a Cyber Response Plan?

https://secureservercdn.net/45.40.148.239/c9d.c9d.myftpupload.com/wp-content/uploads/2022/02/USA-Video.mp4 Introduction If your business got hacked tomorrow and you were locked out of your company data, what would you do? There are many probably reading this that have already had their data hacked, but if you are one of the lucky businesses that have not had a data breach yet, then you need to …

Do you Have a Cyber Response Plan? Read More »

Scroll to Top

Ready to Find Your Solution?

Use the form to schedule a consultation, and we’ll reach out within 48 hours to confirm the appointment.

Considering this delay, please only select meeting dates 48 hours or more in advance. Your information will only be used to facilitate a meeting.