Skip to main content
All Posts By

Steven Pressman

Steve is the President and CTO of Alpine Cyber, responsible for the strategic direction of the company and its products. He is passionate about bringing enterprise grade security to small and medium sized businesses, and advocates for "doing security the right way", including DevSecOps, managed services, and cloud infrastructure. Read his full bio here.

What is Cybersecurity?

By Cybersecurity

Welcome to our new vlog series! These vlogs will highlight different cybersecurity tips and tricks to help you be cyber smart and show you how to protect yourself and your company from cyber-attacks. In part 1 of our video series, we’re exploring “What is Cybersecurity” and we walk you through the CIA Triad to show you how you can be cyber smart by focusing on Confidentiality, Integrity, and Availability. Contact Us to learn more about how we can be your cybersecurity partner.

Read More

The Impact of Working Remotely on Endpoint Security Management

By Cybersecurity

In our last blog post, we introduced, defined, and explained Endpoint Security Management and why your company should have endpoint protection in place. In part two of this series, we explore how and why the shift to working remotely is changing the IT and cybersecurity landscape and increasing the need for endpoint security tools. Working Remotely Has Changed the Technology Game It’s not a stretch to say that the sudden shift to working from home in 2020 thanks to COVID-19 caught a lot of people and companies by surprise. In an instant, everything changed with new policies, procedures, and, in…

Read More

What is Endpoint Security Management?

By Cybersecurity
What is Endpoint Security?   You’re probably familiar with terms like “ransomware”, “malware”, “phishing”, and “data breaches” and (hopefully) have tools in place to help prevent those cybersecurity attacks. But, what about Endpoint Security? If that term is new to you, it’s ok; I’m here to help you understand what it is and why Endpoint Security Management is a crucial component of your company’s security posture. Endpoint management is the process of ensuring that anything (including servers, desktops, laptops, tablets and smartphones) that’s used to access your company’s network is secured, monitored, and managed. Or, in simpler terms, it’s making…
Read More

Put It In the Cloud. It’s Safer There.

By Cloud Computing, Cybersecurity
Times Have Changed – For the Better It wasn't long ago – maybe 10 years – that the headline of this article would have blown my mind.  And I'd probably have dismissed this whole blog post as ridiculous propaganda.  But times have changed. If you're still a cloud naysayer, even after all this time, I don't expect this little post to fully change your mind.  But maybe it can put a chip in your preconceptions. And I'm not going deep here.  If you want to talk more, question my assumptions, or even rage from your rooftop, please feel free to…
Read More

How The Grinch Stole… Your Information – Part 1

By Cybersecurity
We'll start out by stating the obvious: Thieves stink. Nobody likes to get robbed. More so, nobody likes to admit that they didn't prevent thieves from entering their house and taking their stuff. So generally speaking, it is always a good idea to lock your house's windows and doors. Apply that same mindset to your home network. When most people think of their network, they focus on their laptop and desktop computers. But in this day and age, networks are much broader! Your network is comprised of your computers, phones, home automation components, smart TVs, smart appliances, and more. Each of…
Read More