Articles written by Destiny Bertucci

blog icon
Cybersecurity

Cybercrime Trends and the Economy

It’s no secret that there is a lot of money involved in cybercrime. With McAfee estimating the annual global cost of cybercrime at just…

Destiny BertucciNov 24, 2022
blog icon
Cybersecurity

What is Ransomware?

According to Veeam’s 2022 Ransomware Trends Report, less than 69% of data stolen during ransomware attacks in 2021 was ever…

Destiny BertucciOct 27, 2022
blog icon
Cybersecurity

What Is Phishing? Insider Risk & How to Prevent It

When it comes to security, phishing is one of any IT team’s biggest concerns—as it targets the weakest link in the security…

Destiny BertucciOct 13, 2022
blog icon
Network protocols

What Else But SNMP?

Most network engineers have a love/hate relationship with the Simple Network Management Protocol (SNMP). Ok, maybe it’s more like…

Destiny BertucciApr 7, 2022
blog icon
Tech industry

Data Sovereignty: Everything You Need to Know

“What’s data sovereignty? Is it the same thing as data privacy? What about data sovereignty vs data residency?” These are questions…

Destiny BertucciApr 5, 2022
blog icon
Troubleshooting

Cover Your DRaaS: Everything you need to know about Disaster Recovery

Unplanned downtime carries a hefty price tag for enterprises. In 2020, critical server outages cost enterprises on average at least…

Destiny BertucciFeb 15, 2022
blog icon
Trends, forecasts & research

10 Best Network Monitoring Tools, Compared

There are plenty of options for network monitoring tools today, and that can make it hard to pick the right one for you. Here, we’ll…

Destiny BertucciJan 21, 2022
blog icon
Cybersecurity

Beyond Zero Trust: What is Continuous Security Validation?

Your continuous control validation efforts can force you to improve your security controls. In turn, your continuous control validation…

Destiny BertucciJan 11, 2022
blog icon
Network assessments

Government IT Modernization Must Be More than Skin-Deep

The fact of the matter is that modernizing government technology has become a necessity. The COVID-19 pandemic proved just how…

Destiny BertucciNov 16, 2021
blog icon
Network management

Preventing Firmware Attacks

Firmware attacks are on the rise, so it is more important than ever to invest in firmware security. Learn how to defend & prevent…

Destiny BertucciAug 3, 2021
blog icon
Network management

What’s the Difference Between Observability vs. Monitoring?

Monitoring tells you when something is wrong, while observability provides you context as to why. Let's look at how they work together to…

Destiny BertucciJun 29, 2021
blog icon
Network management

How to Monitor Router Traffic: 6 Router Monitoring Tips

Router traffic monitoring gives IT admins real-time insight into any potential network hazards. Here's 6 router monitoring tips to know…

Destiny BertucciApr 9, 2021
blog icon
Network management

The Importance of Network Documentation

The importance of network documentation becomes very clear when you have to sit down and troubleshoot a network from top to bottom. Or…

Destiny BertucciMar 24, 2021
blog icon
Network monitoring

6 Best Network Traffic Monitor Software Options

Some network monitoring solutions have clear usability gaps, but we found some great choices. Learn about the 6 best network traffic…

Destiny BertucciFeb 10, 2021