UncommonX Blog

Learn how UncommonX solutions are making a major impact on the industry and our customers. Don’t forget to subscibe to our X Factor Files newsletter to receive the latest news and updates.

Subscribe →
finger pointing to xdr security on computer

3 min read

MDR vs. XDR: What’s the Difference?

MDR vs. XDR: Which one is right for your business? While both are powerful security solutions for businesses, they each have their own uses and benefits. This being said, it's important to fully understand where XDR ends and where MDR begins.

Read More

3 min read

XDR vs. SIEM: What’s the Difference?

XDR vs. SIEM: which one is right for your business? Both XDR and SIEM are powerful security tools that help capture data sources such as network data...

Read More

2 min read

How to Configure Cisco Port Security

Port security is a layer two traffic control feature on Cisco Catalyst switches. It enables administrators to configure individual switch ports to...

Read More

3 min read

Technology Alone is a Weak Defense Against Cyber Threats

Since prehistoric times, humankind has developed tools to make their lives easier, more productive, and even safer. Yet those tools didn’t operate on...

Read More
Woman at computer monitoring displays.

3 min read

What to Look For in a Managed Detection and Response Provider / Part 2

This is the second of a two-part series. For the first part, click here.

Read More

1 min read

The Greatest Threat: Five Ways SMBs Can Combat Cyberattacks

When cyberattacks make the news, they usually are focused around large organizations, like Colonial Pipeline, Accenture, or JBS, the largest...

Read More