Network Segmentation Security

As we all know, cyber attacks are becoming more and more commonly talked about. Defending yourself against a cyber attack can be difficult, there are so many forms of cyber attacks and multiple ways you can try to anticipate them. However, network segmentation is effective for anyone and everyone in helping to slow down the

Read More »

Layered email security

We all have loads of emails coming in on a daily, especially if your a business. However we all also receive a bunch of spam, and some that have very bad intent for your security! Phishing attacks are becoming some of the most prominent forms of security breaches. Phishing attacks: Phishing is the attempt to

Read More »

Can you hear me? Of course you can, your using VoIP!

VoIP stands for Voice over Internet Protocol, and its pretty cool! VoIP is an alternate way of making phone calls. For VoIP you don’t even need a telephone to use its services! An internet connection and computer is all you’ll need! VoIP is generally used for businesses as a convenient alternative to help enhance functionality

Read More »

Firmware updates aren’t always the best

We at Re2tech make sure to keep our eyes on the radar for any possible security or reliability issues that can arise with technology on a daily basis that may affect you and your business. Recently we had a ping that was unexpected. August 8th was the release of a bunk over-the-air firmware update for

Read More »

Man-In-The-Middle-Attacks, dont get caught in the middle!

the Man in the Middle (MitM), is a form of cyber attack that abuses public WiFi access to hack into peoples information that may pertain to messages to transactions, and even saved passwords. How it works- Clients (which is you) use an access point in a public location, simply put, public wifi, for example caribou.

Read More »

Security and how cyber attacks are evolving!

Cyber attacks are a race against time, every nanosecond an attacker is undetected more systems and vital information can be breached. Sensitive data needs to be protected with utmost seriousness, for it could lead to a string of problems were it to be harnessed from an outside source. Cyber attacks have been evolving at a

Read More »

Have you been pwned?

Following up with our last post on what API V2 is, now we are going to address how API’s can be used against us rather than for, and why you need to stay on top of your security measures! API has been designed for easy use with no authentication and nothing to get in its

Read More »