top of page
CYBERSECURITY AWARENESS
Justin Jackson
Apr 7, 2023
A TRICKY GAP IN YOUR MFA STRATEGY
Traditionally, neither Microsoft nor Google disables the use of legacy protocols by default. The reason is legacy protocols are used by...
56 views
Justin Jackson
Feb 16, 2023
ELITE CYBER OPERATORS WHERE YOU NEED THEM THE MOST
Pathfynder is a veteran-owned small business with offices in Montana, North Carolina, and Washington, D.C.
20 views
Justin Jackson
Jun 27, 2022
THE MOST LIKELY WAY HACKERS WILL RUIN YOUR DAY
Here is an analysis of the most common ways an attacker will target your business using our experience at Pathfynder as a proxy.
75 views
Justin Jackson
Mar 31, 2022
WHY IS CYBERSECURITY SO HARD?
The Battle of Bastion sheds light on the difficulty of being on the defense. Cybersecurity by its nature is defensive which puts...
164 views
Kelly Sharadin
Jun 24, 2021
BEEFING UP WEAK PASSWORDS: HOW TO USE A PASSWORD MANAGER
Poor password management is responsible for the majority of cyber breaches and is still a very preventable vulnerability. Here is a guide...
19 views
Justin Jackson
May 18, 2021
TOP THREE MOST COMMON SECURITY MISCONFIGURATIONS IN YOUR M365/GOOGLE WORKSPACE ENVIRONMENT
Microsoft 0365 & Google Workspace audits are a great example of "low-hanging fruit" initiatives that produce enormous benefits to your org.
67 views
bottom of page