1.888.749.9800

Blog

How to Prevent a Ransomware Attack

It is always better to be proactively prepared and prevent ransomware attacks than having to react after an attack occurs. Paying the ransom is not recommended.

Law enforcement and IT Security companies have joined forces to disrupt cybercriminal businesses with ransomware connections. The “No More Ransom” website is an initiative by […]

  • Permalink Gallery

    How to Ensure the Security of Your Cloud Storage in 2018: The Top Experts Speak

How to Ensure the Security of Your Cloud Storage in 2018: The Top Experts Speak

by Megan Thudium, writer, IT Security Central, January 25, 2018

We’ve heard of the challenges of Amazon S3 Buckets and the exposure of customer data to the world wide web. When cloud storage technology emerged, the new technology had plenty of hype. Companies flocked to the new technology, and they started integrating it into their daily work structure. However, […]

Intel’s Meltdown and Spectre Vulnerabilities

By now you have probably read some articles about the Meltdown and Spectre vulnerabilities but you may still be seeking guidance for how your organization should react.

First a quick recap, Meltdown and Spectre were announced early in January of 2018. Unlike most other vulnerabilities, Meltdown and Spectre exploit critical vulnerabilities in modern processors. Meltdown primarily […]

  • Permalink Gallery

    Protecting Systems and Data for a Traveling Workforce is Crucial

Protecting Systems and Data for a Traveling Workforce is Crucial

by Samuel Greengard, writer, Security Roundtable, January 24, 2018

Mobility is at the center of today’s enterprise. Employees rely on smartphones, tablets, and personal computers to access data anywhere and at any time. It’s no news flash that these devices are now a critical piece of the enterprise productivity scheme. Yet, all the gain doesn’t come without some pain: employees carrying devices and […]

The Internet of Things: Still Lots for You to Learn

by John Edwards, InformationWeek, January 11, 2018

IT groups will need to provide architecture, data-mining tools and connectivity, while giving business groups the freedom to innovate on their own with the Internet of Things.

The Internet of Things (IoT) is already making a significant impact in a variety of business areas, including industrial monitoring and production, supply chain tracking, and multiple […]

  • Permalink Gallery

    Why Phishing and Social Engineering Continue to be so Popular

Why Phishing and Social Engineering Continue to be so Popular

Phishing and social engineering continue precisely because they are so effective!

Sophisticated User: If you are the vice president of customer service and you receive an email purportedly from the Better Business Bureau that contains a link to Complaint #67587 about one of your products, how do you not click through on that embedded link?

Is a Cyber Pearl Harbor a Real Threat?

by Samuel Greengard, writer, Baseline, December 12, 2017

In recent weeks, U.S. financial institutions such as JP Morgan Chase, Capital One and Wells Fargo have undergone sustained cyber-attacks from sources that security experts say could be a hostile foreign government or terrorist organization. Some experts, including Defense Secretary Leon Panetta, have cautioned that this distributed denial-of-service (DDoS) activity could foreshadow […]

Cyber Security Trends and Predictions for 2018

I was recently asked my thoughts about cyber security trends for the coming year. Here are a few of my predictions:

  • GDPR requirements will expose data handling issues that greatly exceed expert predictions. Tools will be developed to automate the encapsulation of discovered data into secure cloud based environments.  This will address security and data […]
  • Permalink Gallery

    Increasing Threat of Cyber Attacks: How Cyber Security has Shifted

Increasing Threat of Cyber Attacks: How Cyber Security has Shifted

Following are answers from a recent interview looking at the threat of cyberattacks and how cyber security has increased in recent years.

Q. What’s driving the shift in cyber security?

A. As the world becomes more digitally connected with a wide variety of available technologies and options, the need to secure the data has increased dramatically. The […]

  • Permalink Gallery

    What are the five most critical steps to take during the first 48 hours post data breach?

What are the five most critical steps to take during the first 48 hours post data breach?

1. Protect – The first and most important (time sensitive) step is to protect your environment and prevent additional damage and/or data loss.  This could be as simple as disconnecting from any wired and wireless networks.  Also disconnect any local backup drives that could overwrite previously archived data.

2. Communicate – It is vital to […]

Cloud security and IoT are the new peanut butter and jelly

by Christine Parizo, writer, Tech Pro Research, October 2017

For enterprises using cloud services with IoT, it’s critical to adhere to as many security practices as possible. Experts weigh in on the best approaches to take.

The Internet of Things (IoT) adds another sticky layer to the question of cloud security. Most organizations think in terms of the devices themselves, rather […]

Fighting Cyber-Threats With Innovative Tech

by Samuel Greengard, business & technology reporter, Baseline, Oct. 24, 2017

Increasingly sophisticated and dangerous cyber-threats require more innovative security approaches, including advanced automation tools, AI and blockchain.

The complexities of today’s cyber-security environment aren’t lost on anyone. It’s increasingly difficult to spot threats, detect intrusions, and thwart hackers and cyber-thieves.

“A cruise through the latest headlines about breaches is sobering,” says […]

Can Additional Legislation Improve IoT Security

I was recently asked if increased legislation could help improve IoT security, and how it will affect the IT department. Here’s my response:

Legislation can absolutely help IoT security by ensuring that manufacturers follow common core principles, strategies and infrastructure. The Cybersecurity Improvement Act of 2017 is an example of how legislation can compel manufacturers to […]

Qualifying IT Security Risks

How should a small organization quantify risk when it comes to IT security?  

In my last post, I discussed how people with little or no IT security experience are often put in charge of IT security at small companies. I explained how they might approach telling their boss how things are going on the security […]

Tips to Maintain IT Security Equilibrium at a Small Company

Ask where somebody working in IT security at a small company got started, and there is a good chance it had nothing to do with IT security at all.

Considering the management infrastructure of the typical small organization, IT security is usually handed off to somebody who knows little about it, usually somebody from the IT […]