Blog

All things security

Have questions on MDM, EDR, or other enterprise security topics? We've
got you covered!
Blog post image describing the post's content
Security

Case Study: Zip Security & Observa defend SaaS company against malware tied to Russia

CrowdStrike and Managed Detection & Response (MDR), deployed and configured through the Zip Security platform, protect company from data exfiltration and credential theft malware.
Anne Maguire
October 18, 2024
5 min read
Blog post image describing the post's content
How To Guide

Mastering Mixed-Platform MDM

For businesses with mixed-platform environments, a dual-solution approach to mobile device management (MDM) using Microsoft Intune and Jamf is the industry standard. Read on to learn about how this set-up best addresses operating system differences.
Anne Maguire
September 16, 2024
5 min read
Blog post image describing the post's content
Security

An Overview of the CrowdStrike Outage & Proactive Strategies for Mitigating IT Disruption

CrowdStrike made headlines early Friday morning as a routine content upgrade pushed bad code to an estimated 8.5 million Windows devices worldwide.
Anne Maguire
July 25, 2024
5 min read
Blog post image describing the post's content
Security

Enhancing Enterprise Security: The Case for Enterprise Browsers

Through its integration with Chrome Enterprise Core, Zip Security enables organizations to centrally manage and secure browser configurations, extensions, and updates across all endpoints.
Anne Maguire
July 23, 2024
5 min read
Blog post image describing the post's content
How To Guide

Start-Up Banking 101: How to Protect your Business from Disruption

Access to funds is crucial for start-ups as it directly affects their ability to operate, grow, and innovate. Learn how to best set-up your accounts and account security to protect against disruption.
Josh Zweig
July 18, 2024
5 min read
Blog post image describing the post's content
Security

Building an Effective Cybersecurity Awareness Program: A Key Component for Organizational Security

Empower your organization with a comprehensive and engaging cybersecurity awareness program to mitigate risks and strengthen your security posture.
Christina Boyer
June 7, 2024
5 min read
Blog post image describing the post's content
Security

A Deep Dive into SaaS Security

A breakdown of SaaS security approach and how to ensure you utilizing the right SaaS security tools to effectively strategy to manage the risks associated.
Christina Boyer
April 26, 2024
5 min read
Blog post image describing the post's content
Security

An Overview of Security Management: Demystifying the terms MSP, MSSP, Co-Management

A breakdown of the management approaches in security, and how to avoid the common pitfalls that businesses experience as they scale.
Christina Boyer
April 19, 2024
5 min read
Blog post image describing the post's content
Company

Announcing Our Collaboration with Ambience Healthcare on a Co-Authored Whitepaper to Help Healthcare Organizations Assess Security Risks

We're excited to announced the release of a co-authored cybersecurity white paper!
Christina Boyer
April 3, 2024
5 min read
Blog post image describing the post's content
Company

We’re Excited to Unveil our New Branding!

We're excited to unveil our revamped branding, break down the design process, and explore the values and story behind Zip.
Christina Boyer
March 25, 2024
5 min read
Blog post image describing the post's content
Security

The Future of Authentication & the Shift to a Passwordless Future

Passwords should no longer be the primary form of authentication. This article breaks down the limitations of passwords, and offers a view of the future of passwordless and multi-factor authentication.
Christina Boyer
March 15, 2024
5 min read
Blog post image describing the post's content
Security

The Evolving Cybersecurity Landscape: Reevaluating the Role of VPNs

In the ever evolving landscape of security and technology, this article explores the question: what is the role of the VPN in a modern security program?
Christina Boyer
February 29, 2024
5 min read
Blog post image describing the post's content
Security

In Defense of Local Admin Rights

Unlocking the debate on local admin rights: Why restricting local admin rights is no longer the answer to securing your organization
Christina Boyer
February 16, 2024
5 min read
Blog post image describing the post's content
Security

Building a Culture of Security Consciousness: Getting a Security Program off the Ground as a ‘Department of One’

A webinar recap discussing prioritization, tooling, and approaches to building a security 'Department of One'
Christina Boyer
February 8, 2024
5 min read
Blog post image describing the post's content
Security

Navigating the Cybersecurity Landscape: A Deep Dive into Device Security

A breakdown of device security tools and how to ensure your fleet is best protected from threats.
Christina Boyer
February 2, 2024
5 min read
Blog post image describing the post's content
Windows

How to manage Windows devices without Microsoft Entra ID accounts

Managing a Windows device that is not joined to Entra can be a complex challenge... we break it down for you.
Christina Boyer
January 25, 2024
5 min read
Blog post image describing the post's content
MDM

Navigating the Cybersecurity Landscape: A Deep Dive into Device Management

A deep dive into Device Management and how to ensure you are selecting the best tool for your organization.
Christina Boyer
January 18, 2024
5 min read
Blog post image describing the post's content
Identity Solution

Navigating the Cybersecurity Landscape: A Deep Dive into Identity Solutions

This deep dive demystifies the complexities of Identity Solutions, offering insights into their mechanisms, selection criteria, and the impact they have on safeguarding against the theft of credentials.
Christina Boyer
January 9, 2024
5 min read
Blog post image describing the post's content
How To Guide

What Cybersecurity Tools do you Need to Build an Effective Security Strategy?

In this post, we’ll cover the fundamental building blocks of an effective cybersecurity strategy and provide practical information on how best to assess different tools to determine which meet your organization’s requirements.
Christina Boyer
January 4, 2024
5 min read
Blog post image describing the post's content
Security

Security for Hard Tech Companies

Securing your hard tech company can be a daunting task. To help you stay secure, we’ve compiled a list of the highest return on investment (ROI) actions you can take to protect your company data.
Gabbi Merz
November 20, 2023
5 min read
Blog post image describing the post's content
Company

Announcing Our $7.7M Funding Round to Protect Businesses from Cyber Threats

We are excited to announce our $7.7M funding round co-led by General Catalyst and Human Capital, with participation from BoxGroup!
Josh Zweig
November 14, 2023
5 min read
Blog post image describing the post's content
Product Update

Satisfy Compliance Frameworks in One Click with Zip

Save countless hours by automatically having your software deployed, configured, and reported against according to your desired compliance framework, with the single click of a button!
November 2, 2023
5 min read
Blog post image describing the post's content
Security

The SMB and the Case of the Personal Mobile Phones

So you are wondering about MDM on personally owned mobile phones
Josh Zweig
October 26, 2023
5 min read
Blog post image describing the post's content
Security

What is an M(S)SP?

MSPs are important players in the tech ecosystem. What actually are they?
Josh Zweig
October 5, 2023
5 min read
Blog post image describing the post's content
SOC2

A Guide to Achieving SOC2 with Zip

SOC2 the easy way
September 21, 2023
5 min read
Blog post image describing the post's content
Security

A Quick Primer on DoD Cybersecurity Standards

A few acronyms you should expect to see
Josh Zweig
September 7, 2023
5 min read
Blog post image describing the post's content
Security

Unlocking the Future of Account Security: Exploring WebAuthn and Biometric MFA

MFA that is more convenient than TOTP and more secure than SMS: WebAuthn using biometrics
Chase Walters
May 26, 2023
5 min read
Blog post image describing the post's content
Security

Prevent Data Breaches From Laptop Thefts

Laptop theft is a growing threat. MDM with remote wiping can help protect sensitive data.
May 18, 2023
5 min read
Blog post image describing the post's content
Security

Startups and Cybersecurity: How to Build a Solid Defense on a Tight Budget

Small businesses must prioritize cybersecurity. Steps include educating employees, enforcing MFA, using strong passwords, securing Wi-Fi, and obtaining cyber insurance.
Ashley Meuser
May 12, 2023
5 min read
Blog post image describing the post's content
macOS

Activation Lock: Friend or Foe

macOS Activation Lock -- friend or foe for small businesses?
Gabbi Merz
May 2, 2023
5 min read
Blog post image describing the post's content
macOS

4 Recommendations for Keeping Your macOS Fleet Up to Date

Keep your macOS fleet secure by following these recommendations: leverage Nudge, define upgrade policies, monitor compliance, and gate major OS upgrades.
March 30, 2023
5 min read
Blog post image describing the post's content
Security

Our Commitment to Security: Announcing SOC2 Type I

Zip Security is now SOC2 Type I compliant!
Gabbi Merz
March 16, 2023
5 min read
Blog post image describing the post's content
macOS

3 Best Practices for Wiping and Locking macOS Devices

Best practices for wiping and locking macOS devices: take care with irreversible actions, disable Activation Lock before off-boarding, and prepare in advance.
Gabbi Merz
March 14, 2023
5 min read
Blog post image describing the post's content
MDM

7 Best Practices for Deploying MDM: Part 2

Part 2 of our article on MDM covers 3 essential best practices for success: communicate changes, know compliance objectives, and pick the right tool.
Josh Zweig
March 2, 2023
5 min read
Blog post image describing the post's content
MDM

7 Best Practices for Deploying MDM: Part 1

This post provides tips for effective Mobile Device Management (MDM) of Mac devices, including managing certificates, staged rollouts, personal recovery keys, and using Single Sign-On (SSO).
Josh Zweig
February 22, 2023
5 min read