fbpx
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Cybersecurity

Bitdefender Antivirus In AWS – Top Five Advantages

Bitdefender Antivirus In AWS – Top Five Advantages

Today, modern security tools including Bitdefender antivirus are known as EDR solutions (Endpoint Detection and Response). They are the next evolution of anti-virus software.  Anti-virus software has always operated based on a “database” of malicious software...

SPK Accelerates Fortune 100 MedDevice Product Sale

SPK Accelerates Fortune 100 MedDevice Product Sale

Our client is Fortune 100 Medical Device manufacturer. SPKAA acts as a product cybersecurity managed service provider for their hospital products which have embedded Windows or Windows OS.   Fortune 100 MedDevice Problem For over 10 years, SPK has provided ongoing...

Use Nessus To Harden Your Cybersecurity

Use Nessus To Harden Your Cybersecurity

Cybersecurity should be baked into the onset of IT and product development processes. Additionally, treating cybersecurity as an afterthought opens your organization up to vulnerabilities and risk. Therefore hardening your IT product cybersecurity with a tool like...

Protecting Device Storage Using Windows UWF

Protecting Device Storage Using Windows UWF

The Unified Write Filter (UWF) is a Windows native feature that ensures a system’s data remains as an unmodified, secure baseline.  Data can be changed by a Windows UWF system user. However, the changes do not persist after a restart. In fact, changes are discarded...

5 Best Practices That Could Have Protected You From Log4J

5 Best Practices That Could Have Protected You From Log4J

Log4j:  What Is It? On December 9, 2021, a critical exploit named "Log4j" was disclosed to the world.  This exploit was particularly harrowing due to the fact that the software library which it targeted is so widely utilized.  “Log4Shell” (CVE-2021-44228,...

How Cyber Security Requirements Can Throw your Medical Device Off Track

How Cyber Security Requirements Can Throw your Medical Device Off Track

In our last article we talked about the four steps your organization must go through when designing secure connected medical devices. With the increasing attention paid to product security in this era of connected medical devices, many companies are scrambling to keep...

Four Steps to Securing Your Company’s Medical Devices

Four Steps to Securing Your Company’s Medical Devices

Connected medical devices offer enormous opportunity for manufacturers and consumers alike. They also carry the burden of increased risk due to cybersecurity flaws. Think about the dangers of having your email or bank account hacked. Now consider the damage hacking a...

Security and Compliance – What Your Company Needs to Know Part 2: MBSA

Security and Compliance – What Your Company Needs to Know Part 2: MBSA

You need more than just an antivirus and security suite to keep your system safe. You need multiple, non-redundant solutions covering various aspects of network security. In our last blog, we discussed the role of whitelisting in keeping your network secure. Now we’re...