Metaverse
Entering the Metaverse: You are the Real Commodity

Raxis’ CEO Mark Puckett explains why we might not wake up in the metaverse tomorrow,[…]

Corporate Cybersecurity
What Companies Should be Telling Investors about Cybersecurity

Investors shoulder much of a company’s cybersecurity risks. They deserve as much information about the[…]

Security Cameras
Three Questions to Ask Before Connecting a Device to the Internet

Should you connect your latest device to the Internet? Lead Penetration Tester Scottie Cole recommends[…]

Raxis CTO, Brian Tant
What is Least Privilege Access?

Raxis CTO Brian Tant explains least privilege access and why it is essential to corporate

Laptop with VPN on
Notes From a Hacker: Yes, You Have to Use Your VPN – and Here’s Why

Raxis CTO Brian Tant discusses how VPNs protect our most critical data and why your[…]

Shawn Ireland interviews Raxis COO Bonnie Smyre on Ohio’s Fox 28's morning show
Raxis COO Shares WFH Cybersecurity Tips on Columbus, Ohio’s Fox 28

“Protect your data in the same way you protect your health.” That’s the main message[…]

Padlocks but one is broken
Celebrate National Cybersecurity Awareness Month Through Security

Join Raxis in celebrating National Cybersecurity Awareness Month (NCSAM).

Woman with padlocks
Helping Nonprofits and Other Growing Businesses Understand Security Risks

Raxis COO Bonnie Smyre was honored to be invited to write a guest blog post[…]

Low Battery
Public USB Charging Ports & Their Potential Security Risks

Raxis VP of Business Development Brad Herring discusses the risks associated with using public USB[…]

Dual LG 5K Monitors on the 2016 MacBook Pro
Dual LG 5K Monitors on the 2016 MacBook Pro

The new LG UltraFine 5K monitors with the USB-C/Thunderbolt 3 ports are simply amazing. A[…]

Fingerprint on keyboard
The Weakest Link in the Password Hash

Raxis VP of Business Development explains easy rules to use to make your passwords more[…]

Person looking at 0s and 1s
The Human Element is Often the Weakest Link

Raxis VP of Business Development Brad Herring discusses social engineering and how many hackers take[…]