Blog

Stay up-to-date on the latest security best practices.

How Using Managed IT Services Can Save You Money

By Daniel Tijerina | Oct 18, 2019 | 0 Comments

How Using Managed IT Services Can Save You Money   Technological advances in today’s digital age come at a dizzying pace. Changes in operational capabilities, regulations, and restrictions can affect the way small businesses must approach their IT systems. It is crucial for employees who are responsible for…more

Read More

Choosing a Third-Party Tech Support Company for Small Businesses

By Daniel Tijerina | Oct 18, 2019 | 0 Comments

Choosing a Third-Party Tech Support Company for Small Businesses   It is never too late for companies of all sizes to make the smart and cost-efficient business investment of hiring a third-party technical support company. A third-party technical support company helps facilitate IT installation, maintenance, and repair needs.…more

Read More

Everything You Need To Know About The Dark Web

By Daniel Tijerina | Sep 19, 2019 | 1 Comment

The internet is a vast, confusing space housing more information and facilitating more communication than humans ever could have imagined. The list of billions of websites and URLs on the World Wide Web continues to grow every day. It can be hard to understand how simple searches and…more

Read More

10 Questions Every Company Should Ask Before Outsourcing IT Services

By Daniel Tijerina | Sep 19, 2019 | 0 Comments

Finding the right service company to outsource the management of your business IT services can be a daunting and complicated task. Service options, package plan pricing, and support parameters vary widely, so it is essential to know what you are getting and if that they offer the best…more

Read More

VantagePointers – Cross-Site Scripting Explained

By Colin Szost | Mar 4, 2019 | 0 Comments

Across That Site Yonder Cross-Site Scripting, sometimes referred to as XSS, is really JavaScript injection at its heart, meaning an attacker is able to inject JavaScript into an application in a manner that will cause the victim’s browser to execute the injected code.  This can be a simple…more

Read More

The Ghost of Data Breaches Past

By Colin Szost | Jan 31, 2019 | 0 Comments

Setting the Stage Data breaches are the monsters hiding under the server rack for any modern business.  Intrusions can remain undetected for months, or as in the case of the recently announced Marriott breach, which compromised data on up to 500 million people, years.  It can take even…more

Read More

Pentest Survival Guide

By Colin Szost | Dec 12, 2018 | 0 Comments

That Time Of The Year Again? Already? Penetration tests are the yearly doctor checkups of the cybersecurity world – uncomfortable, invasive, and yet a necessary part of maintaining your information security health.  While there is no avoiding all the pains of a thorough pentest, hopefully VantagePoint can help…more

Read More

Keys to Securing Hybrid Cloud

By Daniel Tijerina | Oct 4, 2018 | 0 Comments

What are you up against? Hybrid cloud computing offers many benefits to businesses. It also opens the door to many new security vulnerabilities. How can you take advantage of the benefits, but also get out in front of the security challenges? Let’s first examine the unique vulnerabilities in…more

Read More