Featured Blog PostsFeatured RAVENii Blog Posts
Network Security Kansas City: At What Size Does A Network Need Security?
securitycybersecuritynetwork-securitynetwork-sizeraveniikansas-city
When you think of network security Kansas City, most people imagine that their small-to-medium sized business is relatively safe. The…
Network Security: Protect Your Business From Zero-Day Vulnerability Attacks
securitycybersecuritynetwork-securityraveniizero-day
In the world of network security, zero-day vulnerabilities are becoming increasingly common and catastrophic at an alarming rate. As we…
RAVENii Network Security in The News
securitycybersecuritynetwork-securityraveniimedia
You may have seen RAVENii in the news recently, as several outlets have covered our new network security contract with the City of Joplin…
All Blog PostsAll RAVENii blog posts.
Network Security Kansas City: At What Size Does A Network Need Security?
securitycybersecuritynetwork-securitynetwork-sizeraveniikansas-city
When you think of network security Kansas City, most people imagine that their small-to-medium sized business is relatively safe. The…
Network Security: Protect Your Business From Zero-Day Vulnerability Attacks
securitycybersecuritynetwork-securityraveniizero-day
In the world of network security, zero-day vulnerabilities are becoming increasingly common and catastrophic at an alarming rate. As we…
RAVENii Network Security in The News
securitycybersecuritynetwork-securityraveniimedia
You may have seen RAVENii in the news recently, as several outlets have covered our new network security contract with the City of Joplin…
Network Security: Zero-Day Attacks
securitycybersecuritynetwork-securityzero-dayattack
It is common knowledge that strong network security is critical to your business operations. The rise in cyber breaches makes it imperative…
Cybersecurity Risk Factors And Prevention Of Ransomware Attacks
securitycybersecurityransomwarepreventionrisk-factors
In this third and final part of our cybersecurity series on ransomware, we will discuss behaviors that impact your probability of being…
Cybersecurity: Myths And Assumptions About Ransomware
securitycybersecurityransomware
Ransomware is currently the greatest cybersecurity concern for organizations because it is also the most profitable tactic for tech…
Cyber Security Threats: Ransomware
securityransomwarethreats
When it comes to cybersecurity threats, ransomware is one of the scariest. Ransomware blocks access to all or parts of your system until a…
Cybersecurity Concerns In Bringing Employees Back To The Office
securitycybersecuritypandemic
Cybersecurity has been a major concern since the rush to get employees set up to work remotely at the beginning of the pandemic. The…
Verkada Breach
securityverkadadata
Established in 2016, Verkada sells a full suite of physical security monitoring tools that will watch your everyday spaces with devices like…
VMware ESXi vSphere Client (HTML5)
vmwarevspherevulnerabilityremote-code-execution
VMware vCenter Server updates address remote code execution vulnerability in the vSphere Client (CVE-2021-21972) Various exposures in VMware…
Hafnium Targeting Exchange Servers
securityhafniummicrosoftexchange
As of March 2, 2021, Microsoft uncovered several zero-day activities, that currently are being utilized on multiple versions of Microsoft…
Silver Sparrow – Apple Silicon Mac’s Questionable Malware
securitymalwareapple
At the beginning of February, investigators have uncovered a ton of macOS malware that utilized a Launch Agent to produce its existence…
Why USB Devices are Vulnerable
usbvulnerabilitydid-you-know
Did You Know… USBs are an extremely successful instrument for attack. We all use them and they come in many different shapes and forms; we…
The Cost of a Breach
securityhafniummicrosoftexchange
The Cost of Cyber Crime Target, Equifax, Adobe, eBay, LinkedIn, Yahoo, Twitter, Marriott, MGM Resorts, Garmin. What do all of these…
Twitter Security Breach
securitybreachtwitter
On Wednesday, July 15, 2020, Twitter detected a security incident and took immediate action. The attack targeted certain Twitter employees…
Security Concerns and Exploits (July 2020)
securityexploitspalo-altof5-big-ip
Palo Alto Networks Most of us spent the 4th of July holiday celebrating with family and friends and enjoying our extended weekends. Others…
Security Tool Effectiveness
securityconfigurationtools
It’s time to validate the effectiveness of your cybersecurity solutions and here’s why. A recent study showed that only a small percentage…
Back to the Office
securitycovid-19work-from-homestatistics
Hi ho, hi ho, it’s back to the office we go. Are you ready? For months now we have been talking about the pandemic; about the risks of…
Phishing Threats Are Rising Dramatically
securityphishingthreat
Bad actors are taking advantage of the drastic, almost overnight shift to working from home. In a recent survey by Check Point and…
Pandemic Response vs. Cybersecurity Best Practices
securitycybersecuritypandemic
Over the past few months, we’ve all witnessed the unfolding of the coronavirus pandemic. We’ve watched closely as our local, state and…
Not Your Typical Patch Tuesday
securitypatchmicrosoftwindowsvulnerability
On Tuesday, April 14, 2020 Microsoft fixed 113 security vulnerabilities in its various Windows operating systems and related software. Three…
‘War Dialing’ Tool Exposes Zoom’s Password Problems
securityzoomremote-workremote-conference
SecKC members’ creation of zWarDial has found a workaround to evade Zoom’s attempts to block automated meeting scans. Trent Lo, a security…
A Message From the CEO
securitypandemic
With the increase in concern regarding the coronavirus nationally and locally, I wanted to share with you that RAVENii will be implementing…
CONTACT US

Contact us for more information about our services.