1.888.749.9800

brad

Three Security Predictions for 2019

I was recently asked my thoughts about cyber security trends for the 2019. Here are a few of my predictions:

1. Many security issues will still be caused by human error. Despite many technology advances, a significant number of issues are caused by people using bad judgement or organizations deploying hardware and services insecurely. The reality is that […]

By |January 15th, 2019|Blog, Security Breach|Comments Off on Three Security Predictions for 2019

Can Additional Legislation Improve IoT Security

I was recently asked if increased legislation could help improve IoT security, and how it will affect the IT department. Here’s my response:

Legislation can absolutely help IoT security by ensuring that manufacturers follow common core principles, strategies and infrastructure. The Cybersecurity Improvement Act of 2017 is an example of how legislation can compel manufacturers to […]

By |October 23rd, 2017|Blog, IoT|Comments Off on Can Additional Legislation Improve IoT Security
  • Permalink Gallery

    The Best IT Security Policies Reflect the Value of Simplicity

The Best IT Security Policies Reflect the Value of Simplicity

90 percent of what we do to help people get better security is focusing on straight-forward common sense and having consistent policies and procedures.

To be good at what we do, we always work to make things as simple as possible for our customers because we recognize human behavior, and it is so much easier to remember and do simple […]

By |July 17th, 2017|Blog, Security Breach|Comments Off on The Best IT Security Policies Reflect the Value of Simplicity

Tips to Protect Against Ransomware

Following the Wannacry outbreak, we were reading about another attack, called Adylkuzz. Both cyberthreats rely on a Windows bug that was patched on March 14 and only affect PCs that haven’t installed the latest version of Microsoft’s software updates.

In light of this news, I thought it would be timely to talk about some common sense recommendations […]

By |May 22nd, 2017|Blog, Security Breach|Comments Off on Tips to Protect Against Ransomware

How Big an Issue is Security; How can it be Addressed?

Other than the technology itself of an IoT device and the service it provides, the single most important characteristic that will define either success or failure, no matter what the size of the business, will be the security of that device.

The IoT is only in its infancy and yet there have already been an alarming […]

By |March 6th, 2017|Blog, Security Breach|Comments Off on How Big an Issue is Security; How can it be Addressed?

IoT Security Nightmares

At the same time that consumers and manufacturers are getting excited about the potential opportunities, capabilities, and revenue that the Internet of Things (IoT) enhanced devices can offer, many are already starting to understand the frightening lack of essential security functionality and the potentially overwhelming opportunities for exploitation.

The IoT is only in its infancy and […]

By |January 23rd, 2017|Blog|Comments Off on IoT Security Nightmares

What Exactly Does the Future of IoT Security Hold?

Picking up on the conversation from my previous post, the Internet of Things continues to pose challenges for many manufactures as they now have to think about network security for new versions of their products.

One of the worries about the future of the Internet of Things (IoT) is that many of the manufactures that are […]

By |December 12th, 2016|Blog, Security Breach|Comments Off on What Exactly Does the Future of IoT Security Hold?

Security Implications of Connected Consumer Electronics

I’d like to pose a question: What do you think the security implications of connecting various popular IoT consumer electronic devices is?

A) No harder than it was for other new devices like laptops, wireless connections and smartphones, or

B) No easier than it was for previous new devices.

The answer is […]

By |November 30th, 2016|Blog, Security Breach|Comments Off on Security Implications of Connected Consumer Electronics

Cybersecurity by Segregation

With recent news of Singapore disconnecting its government networks from internet access, and now requiring civil servants to use separate computers, I was asked to comment on the security issues this cybersecurity segregation will cause.

Deciding to disconnect from the Internet is clearly a difficult decision and more than likely a result of a reaction to […]

By |August 23rd, 2016|Blog, Security Breach|Comments Off on Cybersecurity by Segregation

IoT Hidden Security Risks

While the security of IoT devices is a growing area of concern for the enterprise, the biggest IoT risk for businesses is if they decide to react to IoT issues rather than plan and prepare for them. Everybody knows that the earlier in a cycle you can deal with a problem, the less expensive it […]

By |August 10th, 2016|Blog, Security Breach|Comments Off on IoT Hidden Security Risks

Protecting Data from Cyber Thieves

Getting hacked is one of the most feared outcomes for anybody who is doing business on or through the Internet. The bad news is there are always people trying to hack systems and get access to sensitive, private or confidential data. The good news is that the tips a financial advisor should follow to safeguard sensitive client […]

By |May 23rd, 2016|Blog, Security Breach|Comments Off on Protecting Data from Cyber Thieves
  • Permalink Gallery

    Is the Panama Paper leak saying anything new about IT security?

Is the Panama Paper leak saying anything new about IT security?

The Panama Paper leak is an example of a whistleblower situation. Clearly, some of those types of situations have been seminal events that have shaped history, policies and perceptions: e.g., Daniel Ellsberg and the Vietnam War, “Deep Throat” and Watergate, and Julian Assange of WikiLeaks to name a few. The up-side of these is that it creates a degree […]

By |April 20th, 2016|Blog, Security Breach|Comments Off on Is the Panama Paper leak saying anything new about IT security?
  • Permalink Gallery

    Steps Enterprises Should Take to Eliminate Website Vulnerabilities

Steps Enterprises Should Take to Eliminate Website Vulnerabilities

It’s understood that security is not an endpoint. It is a process that requires constant vigilance, reassessment and evolutionary change.

The security of a website is no exception. Most websites continue to have security vulnerabilities because the primary focus tends to be on application functionality and not security. Application developers are incented to finish updates quickly and often don’t understand […]

By |June 2nd, 2015|Blog|Comments Off on Steps Enterprises Should Take to Eliminate Website Vulnerabilities
  • Permalink Gallery

    Biggest Misconceptions Companies have about Endpoint Security Tools

Biggest Misconceptions Companies have about Endpoint Security Tools

If I had to choose only one misconception that companies have about endpoint security tools, it is the hope that one solution will resolve most of their concerns. Unfortunately, the appropriate security will largely depend on the type of object you’re trying to protect. Therefore, you have to put in the time and effort to figure out the variety […]

By |February 6th, 2015|Blog, Penetration Testing|Comments Off on Biggest Misconceptions Companies have about Endpoint Security Tools

Steps SMBs Should Take to Protect Their Data

With security breaches continuing to dominate the news, I’d like to take this opportunity to share my response to a recent Q&A addressing the steps small businesses should take to protect their data against security breaches. 

1.  What steps should small businesses take to protect their data and e-commerce sites?

One of the most important steps is to tightly control access to […]

By |October 21st, 2014|Blog, Penetration Testing|Comments Off on Steps SMBs Should Take to Protect Their Data