Author Archives: kaleigh

On The Twelfth Day of CMMC, My Auditor Gave to Me.

On the twelfth day of CMMC, my auditor gave to me… 12. Twelve controls a-controlling:...

Understanding the 32 CFR Final Rule: The MSP Perspective

The Department of Defense (DoD) recently finalized the 32 CFR Final Rule, which significantly alters...

What is Domain Spoofing: Risks, Prevention, and Mitigation

In an era where digital security is paramount, domain spoofing stands out as a significant...

Token Theft: Understanding the Threat and Protecting Your Digital Assets

In the rapidly evolving landscape of digital security, token theft has emerged as a significant...

CloudStrike Security Update Defect -The Blue Screen of Death STRIKES AGAIN

The “Blue Screen of Death.” Many of you may be familiar with this phrase, but...

Evilginx 2 and the Risks to Online Security: Understanding the Threat

In today’s ever-changing world of cybersecurity threats, one of the most concerning developments is the...

The Lockheed Martin Cyber Kill Chain

Here at Axiom, we take cybersecurity seriously. As an MSP we feel a strong commitment...

The Faces of Axiom -Tim

We are thrilled to welcome Tim to our Technician Support team. He has been an...