In Person Events

Two Ways to Protect Your Invisible Assets

At Liberty, we stand by our statement: The best way to get hacked is to believe you won’t be. It makes sense to protect the assets you can see, but, with an average cost of $3.86 million, a data breach of your “invisible” network resources could be even more costly than you might imagine. From your endpoints to the cloud, security must be a priority. Thankfully, Liberty and Cisco Meraki have partnered to expertly answer these challenges with the industry-leading, cloud-based technology of Meraki MX Security Appliance and Meraki MR20.

The Cisco Meraki MX Security Appliance is one of the most powerful security technologies on the market. Managed by the Meraki Dashboard, the MX easily provides complete cloud management, not only for security but also for networking and management control. Quick setup, deployment, and synchronization of security settings means MX will be on the job before a threat becomes a breach. The MX acts as your front line of defense through its six main security features:

  • Next-generation firewall;
  • Content filtering;
  • Intrusion prevention;
  • Malware protection;
  • Cloud-brokered VPN; and
  • Advanced malware protection (AMP)

These features handle threats with little to no downtime, easily implemented firewall rules for all web-facing services, filtering and blocking of certain sites on both a device and global level, and prevention of intrusions from undesirable sources. Plus, AMP is a comprehensive, cloud-based security technology that scans files as they are requested, blocks those that are malicious, and sends alerts when needed.

Next up is the Meraki MR20. If you’re looking for a two-in-one for wireless and 24X7 security monitoring, this champ is for you. It’s cloud-based and self-configuring, making for a simple, quick deployment. A notable feature of the MR20 is its built-in wireless intrusion prevention system (WIPS), Air Marshal, that provides threat detection and attack remediation to ensure you’re establishing secure connections. Might we also add, this solution has had a recent, steep price drop, making it an affordable, secure option for your network.

At Liberty we realize that security must be a priority for any size business, whether local, mid-market, or enterprise. Our endpoint-to-network security solutions stay focused on keeping your business, data, and hardware secure and compliant, so you can stay focused on growing your business.

Security is our job. Contact our team for more information by emailing us at

Back Next

Recent Blogs

Protect Your Data

Your data is one of the most important assets of your business. It is what allows you to keep track of your customers, sales, and operations. However, if this data falls into the wrong hands, it can irreparably harm your business. That’s why it’s so important to protect your data from unauthorized access and theft. […]
Jun 12th, 2019 | by Ben Johnson

How to Take Advantage of Section 179 Tax Code

You’ve most likely put off upgrading your IT infrastructure for too long, but thanks to a special IRS tax code, now might be the perfect time to do so. Small businesses can take advantage of Section 179 of the tax code to deduct operating expenses, like your IT infrastructure. If you are looking for ways […]
Jun 12th, 2019 | by Ben Johnson

Why It Security Is Important For Business

While Liberty Technology provides IT disaster recovery and stands ready to assist you in a moment of crisis, we hope that day never comes. Taking preventative measures can drastically increase the probability that it never will. Don’t think you need the top of the line in IT security or worried it costs too much money? […]
Jun 12th, 2019 | by Ben Johnson

How To Manage A Hybrid Workplace

Working remotely was not just a temporary effect of the COVID-19 pandemic. In fact, it’s not going anywhere. Many businesses are making permanent shifts to full-time remote or hybrid models. If your business has taken this route, have you considered how that will affect data security? Your current security measures and policies are based on […]
Jun 12th, 2019 | by Charles Goodsell

Why Your Company Needs An IT Assessment

How do you feel about your company’s data security? If a hacker tried to steal your data, would they succeed? Would such an occurrence catch you completely off guard and throw your organization into disarray? Would you look back and wonder what you could have done differently to prevent it? The truth is, there is […]
Jun 12th, 2019 | by Charles Goodsell

Having trouble staffing your Internal IT?

In the post-pandemic economy, many small business owners are having trouble getting back to “business as usual.” A big part of that challenge has been attracting talent. According to National Federation of Independent Businesses (NFIB) Chief Economist Bill Dunkelberg, “Main Street is doing better as state and local restrictions are eased, but finding qualified labour […]
Jun 12th, 2019 | by Ben Johnson

5 Things to Look for When Choosing an MSP

A managed service provider (MSP) can provide significant value to your organization. An increasing number of businesses and organizations are turning to MSPs to address their IT needs, including: Security: The constant battle against cyber attacks, data protection and retention, disaster recovery and more involves constant oversight and research that most IT departments simply don’t […]
Jun 12th, 2019 | by Charles Goodsell

The Evolution of the Cloud

Market trends are changing, and the IT world is on the cusp of a big shift. We at Liberty have a mission to stay on the leading edge of all things IT, and it’s our job to make sure you stay right out front alongside us. With the newest consumption model taking form, we are […]
Jun 12th, 2019 | by Ben Johnson

Windows 7 End of Life

After 10 years as one of the most universally loved operating systems, Windows 7 End of Life (EoL) is taking place January 14, 2020. And if there’s one thing zombie season should teach us, it’s to know when it’s time to say goodbye. Sure, Windows 7 brought new features, advancements, increased functionality and usability to […]
Jun 12th, 2019 | by Charles Goodsell

Ryuk Ransomware Attacks and What You Need to Know

Law Enforcement and other Governmental Agencies all over Georgia recently received a shocking warning in regards to what is being characterized as a targeted and organized series of Malware attacks. Shortly after this warning was released, over 20 Texas agencies were crippled. Ryuk Ransomware attacks are targeting Law Enforcement and Government Agencies in an attempt […]
Jun 12th, 2019 | by Ben Johnson

Dishing on Vishing and Phishing

Fraudsters are lurking everywhere, sometimes even in plain sight if you know what to look for. Some hacker-favorite tactics include vishing and phishing. Not sure what these odd words mean? Here’s a quick IT vocab lesson. vish-ing (noun) the fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies […]
Jun 12th, 2019 | by Charles Goodsell

Two Ways to Protect Your Invisible Assets

At Liberty, we stand by our statement: The best way to get hacked is to believe you won’t be. It makes sense to protect the assets you can see, but, with an average cost of $3.86 million, a data breach of your “invisible” network resources could be even more costly than you might imagine. From […]
Jun 12th, 2019 | by Ben Johnson