UncommonX Blog

Learn how UncommonX solutions are making a major impact on the industry and our customers. Don’t forget to subscibe to our X Factor Files newsletter to receive the latest news and updates.

Subscribe →

2 min read

How to Configure Cisco Port Security

Port security is a layer two traffic control feature on Cisco Catalyst switches. It enables administrators to configure individual switch ports to allow only a specified number of source MAC addresses ingressing the port. This helps improve security...

Read More

3 min read

Technology Alone is a Weak Defense Against Cyber Threats

Since prehistoric times, humankind has developed tools to make their lives easier, more productive, and even safer. Yet those tools didn’t operate on...

Read More
Woman at computer monitoring displays.

3 min read

What to Look For in a Managed Detection and Response Provider / Part 2

This is the second of a two-part series. For the first part, click here.

Read More

1 min read

The Greatest Threat: Five Ways SMBs Can Combat Cyberattacks

When cyberattacks make the news, they usually are focused around large organizations, like Colonial Pipeline, Accenture, or JBS, the largest...

Read More

2 min read

How Managed Detection and Response Helps Improve Healthcare Security

Cybersecurity requirements for the healthcare industry during the age of COVID have become even more onerous than before. Risks and threats continue...

Read More
Digital lock in a computer landscape

1 min read

To Pay or Not to Pay: How to Determine if Paying Ransomware Is the Right Decision

If the threat of ransomware is keeping you up at night, you are not alone. The rate of attacks is steadily increasing and the debate of whether to...

Read More