spk-logo-white-text-short2
4%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Cybersecurity

Six Advantages Of Using SentinelOne

Six Advantages Of Using SentinelOne

SentinelOne is an endpoint security tool. It offers cybersecurity protection for platforms including laptops, PC, phones, cloud servers and identity server protection. And it is the next generation in vulnerability endpoint protection platform (EPP).  SentinelOne is...

SPK Accelerates Fortune 100 MedDevice Product Sale

SPK Accelerates Fortune 100 MedDevice Product Sale

Our client is Fortune 100 Medical Device manufacturer. SPKAA acts as a product cybersecurity managed service provider for their hospital products which have embedded Windows or Windows OS.   Fortune 100 MedDevice Problem For over 10 years, SPK has provided ongoing...

Use Nessus To Harden Your Cybersecurity

Use Nessus To Harden Your Cybersecurity

Cybersecurity should be baked into the onset of IT and product development processes. Additionally, treating cybersecurity as an afterthought opens your organization up to vulnerabilities and risk. Therefore hardening your IT product cybersecurity with a tool like...

Protecting Device Storage Using Windows UWF

Protecting Device Storage Using Windows UWF

In this blog we'll explore how the Windows UWF, Unified Write Filter can help protect device storage against product cybersecurity. The Unified Write Filter (UWF) is a Windows native feature that ensures a system’s data remains as an unmodified, secure baseline.  Data...

5 Best Practices That Could Have Protected You From Log4J

5 Best Practices That Could Have Protected You From Log4J

Log4j:  What Is It? On December 9, 2021, a critical exploit named "Log4j" was disclosed to the world.  This exploit was particularly harrowing due to the fact that the software library which it targeted is so widely utilized.  “Log4Shell” (CVE-2021-44228,...

Security layers on a modern website

Security layers on a modern website

Last time, we looked at a basic website design.   Now it’s time to start digging into the details around what’s really being used behind the scenes.   This time, we’ll focus on security aspects.  When a user starts their browser and connects...

Cyber Security in Medical Device Design

Cyber Security in Medical Device Design

With the push by big technology players (Cisco, Google, Intel, etc.) towards connectivity in everyday devices, cyber security is becoming more and more crucial. This push is even seen in medical device design as the industry begins to move toward cloud-integrated and...