Author Archives: kaleigh
On The Twelfth Day of CMMC, My Auditor Gave to Me.
On the twelfth day of CMMC, my auditor gave to me… 12. Twelve controls a-controlling:...
Understanding the 32 CFR Final Rule: The MSP Perspective
The Department of Defense (DoD) recently finalized the 32 CFR Final Rule, which significantly alters...
What is Domain Spoofing: Risks, Prevention, and Mitigation
In an era where digital security is paramount, domain spoofing stands out as a significant...
Token Theft: Understanding the Threat and Protecting Your Digital Assets
In the rapidly evolving landscape of digital security, token theft has emerged as a significant...
CloudStrike Security Update Defect -The Blue Screen of Death STRIKES AGAIN
The “Blue Screen of Death.” Many of you may be familiar with this phrase, but...
Evilginx 2 and the Risks to Online Security: Understanding the Threat
In today’s ever-changing world of cybersecurity threats, one of the most concerning developments is the...
The Lockheed Martin Cyber Kill Chain
Here at Axiom, we take cybersecurity seriously. As an MSP we feel a strong commitment...
The Faces of Axiom -Tim
We are thrilled to welcome Tim to our Technician Support team. He has been an...