BLOG
Read about technology related topics.
We are recognized experts in managed IT services and run one of the most established technology companies in Cincinnati, OH.
FortiEDR: Everything You Need to Know
FortiEDR is Fortinet’s next-generation Endpoint Detection and Response (EDR) solution—powered by machine learning, behavioral analytics, and cloud intelligence. Learn how FortiEDR delivers real-time endpoint protection, automates threat response, and integrates seamlessly with the Fortinet Security Fabric. Managed by Nexigen, it’s endpoint defense built for the modern threat landscape.
Best Practices to Prevent Phishing Attacks
Phishing attacks remain one of the most common and costly cybersecurity threats to businesses. Learn the top best practices to protect your organization—combining technical controls, employee training, and incident response planning. Discover how Nexigen’s phishing platform and Zero Trust approach help safeguard your data and users from evolving cyber risks.
Mac Malware Is Becoming A Bigger Threat For Users
A new strain of Mac malware, known as UpdateAgent, is rapidly evolving into a serious threat. Once considered minor, it now installs adware, bypasses Apple’s Gatekeeper, and paves the way for more dangerous payloads. Learn how Nexigen’s endpoint detection and response (EDR) solutions help safeguard devices against emerging Mac threats and evolving malware tactics.
Dark Herring Subscription Scam Affected Millions Of Android Users
Over 100 million Android users were unknowingly charged $15 per month through a massive scam known as Dark Herring. Hidden across 470 apps on Google Play, the malware subscribed users to premium services using Direct Carrier Billing. Discover how this global campaign went undetected for two years—and how Nexigen’s cybersecurity experts protect mobile users from emerging threats like Dark Herring.
Apple Released A Fix For Multiple Zero Day Exploits
Apple has released urgent security updates to patch two active zero-day vulnerabilities affecting macOS, iOS, and iPadOS. The flaws—CVE-2022-22587 and CVE-2022-22594—allowed hackers to exploit memory corruption and track user activity in real time. Learn how these exploits worked, why they matter, and how Nexigen’s cybersecurity experts help businesses stay protected against emerging threats across all platforms.