Blog

Enterprise Cybersecurity Solutions Knowledge Base

Building Enterprise Security Architecture for Business Protection | CQ

Did you know that cybercrime has increased by over 600% since the start of the pandemic in 2020?..

Eric Dosal
Eric Dosal
September 23, 2021

The Do's and Don'ts of Hiring a vCISO

As the cybersecurity landscape continues to evolve and new threats continue to emerge, having a..

Jose Bormey
Jose Bormey
July 28, 2021

Using SIEM Wildcard to Manage Searches and Alarms on LogRhythm

As we all know, one of the SIEM tool’s primary duties is to maintain a log of all activities going..

Jose Bormey
Jose Bormey
January 27, 2021

Using the Check Point Remote Installation Daemon for Firewall System Administration

Long a feature of multitasking operating systems, a daemon is a computer program that runs in the..

David Barker
David Barker
October 26, 2020

Clearing RAM Cache, Buffer & Swap Space on a Check Point Firewall | CQ

Does your firewall seem like it is always low on memory? Does it get sluggish at times and seem..

David Barker
David Barker
September 21, 2020

What is a Security Breach (and How to Recover From One)?

Sooner or later, no matter how strong your company’s defenses are, someone will manage to..

Eric Dosal
Eric Dosal
May 15, 2020

Coronavirus & Cybersecurity: Our Advice for Working Remotely

As the COVID 19 coronavirus pandemic continues to intensify, more and more organizations are..

Eric Dosal
Eric Dosal
March 25, 2020

8 Cybersecurity Threats to Watch Out for in 2020

They say that hindsight is 20/20, but when it comes to cybersecurity in 2020, foresight is crucial...

Eric Dosal
Eric Dosal
February 11, 2020

5 Need-to-Know Benefits of Hiring a Virtual CISO

Many companies struggle to fill the CISO role—opting instead to run without a dedicated C-level..

Eric Dosal
Eric Dosal
January 9, 2020

What is EDR and How Can You Use It?

There are countless cybersecurity tools that modern businesses need to counter cybersecurity..

Eric Dosal
Eric Dosal
October 10, 2019

How to Use Custom Alerts to Make SIEM Management Easy

Security information and event management (SIEM) systems are crucial for helping modern businesses..

Eric Dosal
Eric Dosal
June 18, 2019

How to Integrate an Outsourced Network Security Team

So, you’ve just hired an outsourced network security team to help your company improve its..

Eric Dosal
Eric Dosal
June 12, 2019

contact us

Protect your business with our cybersecurity solutions

Elevate your cybersecurity efforts now to prevent costly breaches. Let’s discuss next steps. Complete this form so our IT security professionals can get in touch with you.

Compuquip uses the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

What are you looking for?