Sign in to view Matt’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Greater Chicago Area
Contact Info
Sign in to view Matt’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
1K followers
500+ connections
Sign in to view Matt’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
View mutual connections with Matt
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
View mutual connections with Matt
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Sign in to view Matt’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
About
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Experience & Education
-
University of St. Francis
********* ** **** ********* ******* & *********** **********
-
-
****** ****** **. ***** ************
******* ****** *******, **********, *********, ********
-
View Matt’s full experience
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
View Matt’s full profile
Sign in
Stay updated on your professional world
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Other similar profiles
-
Donata Nieciunski, MS, CCC-SLP/L
Speech and Language Pathologist
Greater Chicago AreaConnect -
Christy Skubi
Network Security Analyst at DCP Midstream
Littleton, COConnect -
Zygimantas Riauka
Professional Basketball Player at Urupan pando
Downers Grove, ILConnect -
Greg Smith
Tulsa, OKConnect -
Christopher Cesarano
Associate Content Publisher at designory
Mullica Hill, NJConnect -
Alejandro Cahue
Greater Chicago AreaConnect -
Justin Houghton
Mechanic at Altom Transport
La Porte, TXConnect -
Klaudia Kotori
Finance|Lending|Credit|Compliance|Deposit Growth|Leadership|Operations|Risk Management
Schiller Park, ILConnect -
Hazel Ortiz Rosado
Production Coordinator at HH Global
Greater Tampa Bay AreaConnect -
Michael Benzinger
Full Stack Developer | React, Ruby on Rails
Greater Chicago AreaConnect -
Brian Peterson
Greater Chicago AreaConnect -
Michael Flaherty
Greater Chicago AreaConnect -
Raquel Doggett, MBA
Account Director | Relationship Pro | Communication Specialist
Greater PhiladelphiaConnect -
Eddie Hoyos
Project Manager, Ahern Fire Protection
Greater Chicago AreaConnect -
Casilda K.
Associate Content Publisher at The Designory
Greater Chicago AreaConnect -
Žygimantas Skrolis
Vilniaus, LithuaniaConnect -
Sarah Dever
Account Manager at Dragons Group
West Chester, PAConnect -
Olivia Koerner
Plainfield, ILConnect -
Robert Stokes, GISP
United StatesConnect -
Brian Doyle
Greater Chicago AreaConnect
Explore more posts
-
Cyber Vigilantia
This Week in Cybersecurity (May 5th - May 10th) Major Attacks and Breaches: Ohio Lottery Ransomware Attack: The Ohio Lottery Commission was hit by a ransomware attack, potentially impacting over 500,000 customer accounts. City of Wichita Ransomware Attack: LockBit ransomware group claimed responsibility for an attack on the City of Wichita, disrupting government services. Dell Data Breach: Dell Technologies revealed a database breach that exposed customer names and addresses. Industry Trends and Research: CISA Launches "Vulnrichment" Program: The US Cybersecurity and Infrastructure Security Agency (CISA) announced a new initiative to address the growing backlog of unpatched vulnerabilities. Cybercriminals Exploit Vulnerabilities Faster: A report by Fortinet found that cybercriminals are exploiting newly discovered vulnerabilities in just 4.76 days on average, highlighting the importance of swift patching. Criminal Use of AI on the Rise: Security experts warn that criminals are increasingly using artificial intelligence (AI) for malicious purposes, although their adoption still lags behind defenders. For more information, you can visit the websites of the following security publications: SecurityWeek (https://lnkd.in/gsRNJej) The Hacker News (https://thehackernews.com/) Cyware (https://cyware.com/) #cybersecuritynews #cybervigilantia #cybersecurity #blogs
2 -
Kenneth Dantin
A customer once said to me: "we can throw more security at thing but what chance do we have?", when reviewing email security. Refering to a solution that was compromised by at a local Bank. A different product in their line, but the trademark name is all that is remembered. My answer is and has always been it depends on the solution and the knowledge of the person(s) implementing and policing that solution. The use of the solution and the proper configuration of that solution are two different things. No one and nothing is impenetrable, but investment in security is paramount. Many things are socially engineered, examples being: former employees with knowledge, employees paid off to plug in a malicious thumb drive into an internal system, etc. The State of Ohio will never reveal exactly what happened, but also there are 49 other states this hasn't happened to. Bad actors are resting on their status quo and you should be looking to implement things to protect yourself. Cyber Security doesn't have to be expensive, it just sounds expensive. Your investment into your business is worth protecting.
-
Mike Semel
As an MSP, your clients rely on you to keep their data safe. But are you equipped for the upcoming CMMC requirements? My 'CMMC Desktop Reference Guide' is designed specifically for MSPs, giving you the tools and knowledge to not only meet compliance, but also impress your clients and attract new business. Don't wait until it's too late – download the guide now and stay ahead of the game. https://lnkd.in/g4_veZz8 #CMMC #guide #compliance #business
3 -
Mike Semel
As an MSP, your clients rely on you to keep their data safe. But are you equipped for the upcoming CMMC requirements? My 'CMMC Desktop Reference Guide' is designed specifically for MSPs, giving you the tools and knowledge to not only meet compliance, but also impress your clients and attract new business. Don't wait until it's too late – download the guide now and stay ahead of the game. https://lnkd.in/g4_veZz8 #CMMC #guide #compliance #business
3 -
Amicus IT, LLC
Is your St. Louis business protected against the latest cyberthreat? A new type of malware called Cuttlefish is targeting routers, putting your company's sensitive information at risk. Cuttlefish can steal login credentials and other valuable data, all while evading traditional security measures. Think of it as a digital intruder slipping through an unlocked window. We understand that navigating the world of cybersecurity can be overwhelming, so we're here to help. Here are a few simple steps you can take to protect your business: 🔹Strengthen your router passwords: Avoid using simple or easy-to-guess passwords. 🔹Keep your router software up-to-date: Regular updates often include important security patches. 🔹Restrict remote access: Limit who can access your router's settings. 🔹Monitor for unusual activity: Keep an eye out for unexpected logins. If you're unsure about your company's security, our expert team can provide a thorough assessment and offer tailored solutions to keep your business safe. Contact us today for a free consultation. We're committed to protecting St. Louis businesses from cyberthreats. #StLouisBusiness #Cybersecurity #DataProtection #Malware #routers https://lnkd.in/gnsb9zv6
-
Dave Solano
Defense Industrial Base (DIB) CMMC Tip Five Steps to Make Your Company More Cyber Secure 1. Educate people on cyber threats. Most cyber incidents start because of user error. Educate people about the importance of setting strong passwords, recognizing malicious links, and installing the latest security patches. Helpful materials and training videos are available through Project Spectrum. 2. Implement access controls. Limit information systems access to authorized users and the specific actions that they need to perform. 3. Authenticate users. Use multi-factor authentication tools to verify the identities of users, processes and devices. 4. Monitor your physical space. Escort visitors and monitor visitor activity, maintain audit logs, and manage physical devices like USB keys. 5. Update security protections. Make sure to download the latest security patches when new releases are available. Always double check to make sure they are coming from a trusted source. https://lnkd.in/eMhfCPAv
51 Comment -
Mike Smith
Why does Complete Computing Solutions use Connectwise 24/7 SIEM/SOC monitoring tool? At Complete Computing Solutions, we leverage the ConnectWise 24/7 SIEM SOC tool to ensure the utmost security for our clients. Just like you'd install an alarm system to safeguard your home or business, this tool serves as a vigilant guardian for your digital assets. It provides continuous monitoring, detecting potential threats in real-time, and enabling prompt responses to any security breaches. With this solution, we offer peace of mind, knowing that your business is safeguarded around the clock, even during holidays and off-hours. Partner with us for robust cybersecurity protection that never sleeps. #Cybersecurity #SIEM #SOC #CCSTexarkana
-
Raymond Jones
Another day means another reminder of why cybersecurity should be a top priority for companies' short and long-term visions. With the increasing frequency and sophistication of cyber attacks, it is crucial for businesses to invest in robust cybersecurity measures to protect their operations, data, and reputation. Ignoring cybersecurity risks can lead to disastrous consequences, including financial losses, legal liabilities, and damage to brand image. Stay ahead of the game by making cybersecurity a priority in your company's vision. #cybersecurity #businessstrategy #riskmanagement
6 -
Anthony V.
smb signing vs smb encryption ask Questions for all the folks out there: 1. How many folks are using both? 2. What is the performance hit you experienced? Can you quantify smb s vs smb e? 3. Let's hypothetically say you have smb signing enabled did you hit any road blocks when you turned on smb encryption? DM me. Help a fool out =) #cybersecurity #blueteam #redteam #bitcointeam
13 Comments -
Chris Bounds
You keep hearing over and over that this highlights the reason for a multi-cloud and vendor strategy regarding this Crowdstrike outage. I’d love to hear your theory: 🤔 How would you split your security vendors and sensor deployment? 🔍 What factors do you consider? • Location • User Role • Device model • OS flavor • Security profile • etc For example: • Crowdstrike on device A • SentinelOne on device B • Azure Sentinel on device C What would determine your choice? 💡 Additional questions to ponder: • Does this highlight a need to govern certain software on critical infrastructure systems? • Does this emphasize the importance of having a staged patching process (Admin test group, user test group, batch updates once a week)? • Or does it point to the necessity of a thorough QA process?
5 -
PacketLogix, Inc.
This Week’s Cybersecurity Tip of the Week, provided by PacketLogix IT Security Tip: Should your laptop be encrypted? It’s just another Tuesday on your way to work and you stopped by your favorite busy coffee shop to get your caffeine fixed. You set your tablet down to add the cream and, when you turn back, your laptop is gone. It’s nowhere in sight, nor is the thief who stole it. If you have a password on your laptop, it will slow the thief down; but what it doesn’t stop is someone removing the hard drive and connecting it to another computer to get access to all your files, passwords and e-mail –that’s not hard to do. How do you protect your files? Encrypt them! With the drive encrypted, a thief can’t just pull it out, hook it up and suddenly have access to all your files. This is ESPECIALLY important if you hold or have access to medical records, credit card information or other sensitive data on your devices. To schedule your Business Security Score Assessment, go to https://lnkd.in/eMNKXb6q or call 401-227-2695 or via email at nikki@packetlogix.com .
-
Charles Maddox
Transform yourself into an Offensive Cybersecurity Pro with the Ultimate Red Team Cyber Suite for an unbeatable price of just $4.99 per course! 💥 Take advantage of this exclusive offer and sign up now before it's too late. 👇 https://lnkd.in/gCVUEYZP . . . #RedTeamCyberSuite #CyberSuite #cybersecurityTraining #cybersecurity #CyberAgilityAcademy
1 -
Andrew Filla
Preventative measures and cyber security tooling are useless when a sysadmin downloads compromised software. The open source, commercial, and in-house developed software that your Enterprise depends on must be trusted. Together Software Asset Management + Cyber Security = a Secure Enterprise when your teams evaluate software from financial, functional, and cyber security perspectives. Learn about how the Secure Software Supply Chain is a framework for bringing these complimentary capabilities together by attending our session at IAITAM ACE 2024 on May 7 at 3:30 PDT in Messina 3. #IAITAMACE, #IAITAM, #ITAM
15 -
Jason Slagle
HEY MSP FRIENDS. Want to proactively assess your cybersecurity posture and identify potential vulnerabilities? 💪 Tom Lawrence ✅, Matt Lee, CISSP, CCSP, CFR, PNPT, John Hammond and myself are looking for several volunteer MSPs to participate in a FREE authorized penetration test. During the test, we will be attempting to hack you. We will be using the results in a series of talks we are giving. You can choose to remain anonymous in the talks if you desire. What you'll get: 📈 Expert assessment: Detailed report outlining identified vulnerabilities and actionable remediation steps. 🔒 Peace of mind: Knowing your infrastructure is secure against evolving threats. 🤝 Opportunity to contribute: Be a part of our research and help other MSPs enhance their security posture. 💙 Our ever lasting thanks. Participation is completely voluntary and confidential. Your identity will be protected if you wish in our public talks. If you're interested, please go to the following URL and fill out the interest form: https://lnkd.in/gPNH2xY7
11035 Comments
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More