UncommonX Blog

Learn how UncommonX solutions are making a major impact on the industry and our customers. Don’t forget to subscibe to our X Factor Files newsletter to receive the latest news and updates.

Subscribe →
Digital lock in a computer landscape

1 min read

To Pay or Not to Pay: How to Determine if Paying Ransomware Is the Right Decision

If the threat of ransomware is keeping you up at night, you are not alone. The rate of attacks is steadily increasing and the debate of whether to pay or not looms large, especially for midsize organizations. UncommonX’s recent State of...

Read More
Person looking at computer tablet with magnifying glass.

3 min read

Why Network Discovery Is the Foundation of a Secure Digital Environment

Network discovery is foundational to a well-managed and secure digital environment. Unfortunately, most organizations struggle to identify and detail...

Read More

3 min read

4 Benefits of Hiring a Managed Detection and Response Provider

I hear from IT leaders constantly about issues they face trying to protect their organizations at a time when cyberattacks are growing and evolving...

Read More
Hands using a computer keyboard

4 min read

DNS Security Risks and Best Practices

The domain name system (DNS) has been an essential element of modern networking for years. It translates domain names to internet protocol (IP)...

Read More

2 min read

Why Asset Discovery Is Critical for a Well-Managed Network

All security audits, re-architecture, incident investigations, and threat hunting begin with the question, “What is in the environment that I’m...

Read More

3 min read

Key Cybersecurity Threats Confronting Financial Institutions

During my career working with financial organizations, I’ve often heard the mantra, “do more with less.” Organizations are constantly searching for...

Read More

3 min read

Improving Security with MAC Authentication Bypass

Securing network access is critical and MAC authentication bypass (MAB) can help. These days, contractors and visitors require access to network...

Read More