View Post

Cyber Wednesday Info Byte #2

The manufacturers of IOT devices have a responsibility to consider the cybersecurity needs of the consumer. Ensuring the securability of a device must be a priority at every phase of product development. Theses are cybersecurity activities we expect. Learn more from NIST at https://www.nist.gov/publications/foundational-cybersecurity-activities-iot-device-manufacturers

View Post

Cyber Wednesday Info Byte #6

No matter the size of the organization or maturity of the program, the core functions of an effective cyber program are to Identify, Protect, Detect, Respond, and Recover.     Our offering: Unlimited Technology offers solutions for each of the functions of the NIST Cyber Security Framework. Our vulnerability scanning solution is an excellent way of ensuring that “A vulnerability …

View Post

Cyber Wednesday Info Byte #5

The Security and Privacy Controls for Information Systems and Organizations (Draft NIST SP-800-53 R5) presents the next generation of controls that are required to secure all types of computing platforms. The public comment period is now closed, but you can see a preview here: https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/draft Our offering: Unlimited Technology provides a Security Awareness package helping you satisfy AT-2 AWARENESS TRAINING …

View Post

Cyber Wednesday Info Byte #4

Longer passwords are better. Did you know that the current best practice guidance from NIST has removed the requirement to enforce password C0mpl3xity! Arbitrary expiration deadlines are also out. A password should change if you suspect that it has been compromised. Learn more about Digital Identity Guidelines from NIST: https://pages.nist.gov/800-63-3/sp800-63b.html Our offering: In addition to Security Training and Phishing Testing, …

View Post

Cyber Wednesday Info Byte #3

Where should you start when trying to mitigate the risks of IOT devices deployed on your network? NIST has defined the set of technical device capabilities needed to support common cybersecurity controls that protect the customer’s devices, data, systems, and ecosystems. Learn more from NIST at https://csrc.nist.gov/publications/detail/nistir/8259a/final Our offering: Penetration Testing – Beyond vulnerability analysis, we offer pentesting services to …

View Post

Cyber Wednesday Info Byte #1

Information security is defined as the protection of information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability. Learn more from NIST at https://csrc.nist.gov/publications/detail/sp/800-12/rev-1/final

View Post

Exclusive As-A-Service Payment Options for Unlimited Technology’s Solutions

Unlimited Technology has teamed up with TAMCO to create an exclusive as-a-service monthly payment offering that will help customers stay at the forefront of technology. Unlimited Technology announced its financing partnership with TAMCO. TAMCO is a financing company that focuses specifically on solution acquisitions within technology industries. Unlimited Technology will now offer a technology as a service procurement option called …

View Post

The New “Normal”

Unlimited Technology (UT) continues to operate at full capacity during these turbulent times.  Our teams are busy working with new and existing clients on their end-to-end technology solution needs whether it’s security, low voltage, life safety, managed IT/Cyber services, or our Exero monitoring platform for full device agnostic network protection. UT has seen ever increasing demand for our thermal screening …