proxurve

Next Generation AV Protection

[et_pb_section fb_built=”1″ _builder_version=”4.3.2″][et_pb_row column_structure=”2_5,3_5″ _builder_version=”4.3.2″][et_pb_column type=”2_5″ _builder_version=”4.3.2″][et_pb_image src=”https://www.proxurve.com/wp-content/uploads/2020/04/prox_sm_security.jpg” _builder_version=”4.3.2″][/et_pb_image][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.3.2″][et_pb_text _builder_version=”4.3.2″ hover_enabled=”0″] Most AV solutions today are signature based (a digital fingerprint) however cyber criminals today are building threats that don’t use signature thus bypassing your AV protection.  Our new Endpoint Detection and Response (EDR) solution uses artificial intelligence (AI) to protect and stop […]

Next Generation AV Protection Read More »

Free Cybersecurity Training

[et_pb_section fb_built=”1″ _builder_version=”4.3.2″][et_pb_row _builder_version=”4.3.2″][et_pb_column type=”4_4″ _builder_version=”4.3.2″][et_pb_text _builder_version=”4.3.2″ hover_enabled=”0″] Get access to free security training, a free dark web scan and one free simulated phishing attack. Click here to find out more and sign-up. [/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]

Free Cybersecurity Training Read More »

Security Awareness Training – Getting Started

[et_pb_section fb_built=”1″ _builder_version=”4.3.2″][et_pb_row _builder_version=”4.3.2″][et_pb_column type=”4_4″ _builder_version=”4.3.2″][et_pb_text _builder_version=”4.3.2″] Security Awareness Training How to get started   We are happy that your company has elected to do this security awareness training to keep security top-of-mind, especially while working from home.  Below are the instructions on how to get started.  This training does not have to be completed

Security Awareness Training – Getting Started Read More »

Best practices for working from home

[et_pb_section fb_built=”1″ _builder_version=”4.3.2″][et_pb_row _builder_version=”4.3.2″][et_pb_column type=”4_4″ _builder_version=”4.3.2″][et_pb_text _builder_version=”4.3.2″ hover_enabled=”0″] Many of us are now finding ourselves working from home, which has created unfamiliar terrain from what we’re accustomed to, but hackers — who are continuing their activities unabated — may see this time of uncertainty as an opportunity. That’s why you and your employees need to

Best practices for working from home Read More »

Take Control Remote Access Instructions

[et_pb_section fb_built=”1″ _builder_version=”4.3.2″][et_pb_row _builder_version=”4.3.2″][et_pb_column type=”4_4″ _builder_version=”4.3.2″][et_pb_text admin_label=”Text” _builder_version=”4.3.2″] Take Control Remote Access Instructions   NOTE:  Firefox was used to make these instructions.  If you are using another browser like Chrome, Edge or Internet Explorer the screenshots may differ slightly. Login to https://proxycare.proxurve.com Click on the green icon next to the computer you want to remotely

Take Control Remote Access Instructions Read More »

Use Microsoft Authenticator with Office 365

[et_pb_section fb_built=”1″ _builder_version=”4.3.2″ custom_margin=”||-3px|||” custom_padding=”||0px||false|false”][et_pb_row _builder_version=”4.3.2″][et_pb_column type=”4_4″ _builder_version=”4.3.2″][et_pb_text _builder_version=”4.3.2″] If your organization is using 2-step verification for Office 365, the easiest verification method to use is Microsoft Authenticator. It’s just one click instead of typing in a 6-digit code. And if you travel, you won’t incur roaming fees when you use it. [/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.3.2″

Use Microsoft Authenticator with Office 365 Read More »