Skip to main content
All Posts By

Steven Pressman

Steve is the President and CTO of Alpine Cyber, responsible for the strategic direction of the company and its products. He is passionate about bringing enterprise grade security to small and medium sized businesses, and advocates for "doing security the right way", including DevSecOps, managed services, and cloud infrastructure. Read his full bio here.

The Importance of Patching in SMB Cybersecurity

By Best Practices, Cybersecurity, Risk Management, Vulnerabilities
As a small to medium-sized business (SMB), it's essential to prioritize patching in your cybersecurity strategy. Patches are software updates that fix security vulnerabilities. Without a robust patching process, your organization is at risk of falling victim to cyber attacks. But why is patching so important? The answer lies in the ever-evolving threat landscape. Hackers are constantly seeking new ways to exploit vulnerabilities, and if you don't keep up with patches, you're leaving yourself open to attack. So, How Do You Prioritize Patches in your Organization? The key is to consider three critical factors when prioritizing patches: Criticality: How severe…
Read More

The Silent Threat: Why Vulnerability Management is Crucial for SMB Security

By Cybersecurity, Risk Management, Small Business, Vulnerabilities
As a small to medium-sized business (SMB), you're likely no stranger to the ever-evolving landscape of cybersecurity threats. But despite your best efforts, vulnerabilities in your installed software packages and in your application configurations can leave you exposed to devastating attacks like ransomware, hacks, and data loss. The truth is, without effective vulnerability management, even the smallest mistake can have catastrophic consequences. That's why it's essential for SMBs to prioritize this critical aspect of IT security. The Biggest Vulnerability Concerns So, where do most vulnerabilities lie? For SMBs, some of the biggest risks are: Server Vulnerabilities Some SMBs don't ever…
Read More

Email Security to Protect Your Business

By Cybersecurity
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
Read More

The Lifeblood of Business: Why Email Security is Crucial for Small and Medium-Sized Enterprises

By Cybersecurity, Email Security, Small Business
Email is the lifeblood of all organizations, especially small- and midsize businesses (SMBs). It's how you communicate with customers, partners, and employees. It also happens to be one of the primary vectors for bad people to do bad things. To reduce risk, you must keep your communications channels #secure. With #phishing attacks, spam, and other cybersecurity threats on the rise, emailsecurity must be one of your top priorities. In today's blog, we explore the importance of three fundamental technologies in the mail protection space: SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting, and Conformance).…
Read More

We Need to Talk…About Ransomware – Part 2: Avoiding a Ransomware Attack

By Cybersecurity
Welcome to Part 2 of our Ransomware Vlog Series! In part 1, we discussed ransomware basics: what it is, what happens if you fall victim to an attack, and initial recovery and prevention steps. In part 2, we'll dive deeper into how you can prepare your organization's capabilities to avoid an attack, including restricting internet access, running simulated attacks, and patching systems. Stay tuned for part 3, and reach out to us if you need any help with ransomware issues or any other cybersecurity or IT needs.
Read More