Justin JacksonApr 7, 2023A TRICKY GAP IN YOUR MFA STRATEGYTraditionally, neither Microsoft nor Google disables the use of legacy protocols by default. The reason is legacy protocols are used by...
Justin JacksonFeb 16, 2023ELITE CYBER OPERATORS WHERE YOU NEED THEM THE MOSTPathfynder is a veteran-owned small business with offices in Montana, North Carolina, and Washington, D.C.
Justin JacksonJun 27, 2022THE MOST LIKELY WAY HACKERS WILL RUIN YOUR DAYHere is an analysis of the most common ways an attacker will target your business using our experience at Pathfynder as a proxy.
Justin JacksonMar 31, 2022WHY IS CYBERSECURITY SO HARD?The Battle of Bastion sheds light on the difficulty of being on the defense. Cybersecurity by its nature is defensive which puts...
Justin JacksonMay 18, 2021TOP THREE MOST COMMON SECURITY MISCONFIGURATIONS IN YOUR M365/GOOGLE WORKSPACE ENVIRONMENT Microsoft 0365 & Google Workspace audits are a great example of "low-hanging fruit" initiatives that produce enormous benefits to your org.