Microsoft Announces Plans to Deprecate NTLM from Windows
Microsoft and Apple tend to develop their desktop operating systems under a fundamentally different...
Steps Every IT Leader Must Take to Prepare Their Organization for AI
Artificial Intelligence (AI) is undeniably the buzzword of the day, with promises of efficiency,...
The Importance of Threat Hunting & How Arctic Wolf Can Help
Threat hunting is a new breed of security profession designed to discover threats on your network....
Microsoft Loop is now in Public Preview!
We’ve been super excited about Microsoft Loop since it was first previewed at Ignite in March 2021....
Incident Response 101
Incident response is a critical part of any security program. It helps when an attack happens, and...
Privileged Identity Management for Groups
Principle of least access. It’s a fundamental concept in both cloud and on-premises security...
Should You Trust Zero Trust? (& other security buzzwords)
We’re all familiar with infamous buzzwords like circle back, touch base, hard stop, and many more....
You ARE The Target
“I’m not an executive or celebrity, nobody wants to hack me.” Yes, they do. Full stop. To spin off...
Top 10 Security Mistakes Your Users Make
At Synergy Technical, we know that October is Cybersecurity Awareness Month. To get ahead of the...
What are Zero-Days?
You may have seen references to zero-days (or 0-days) a lot recently with the Apple and Google...