News

Submit
Why You Need SIEM

Why You Need SIEM

Security information and event management (SIEM) software gives security professionals both insight into and a track record of the activities within their IT environment.  It’s a group of complex technologies that together, provide a centralized bird’s-eye-view into a network’s infrastructure.

Tis the Season for Cyber Crime: 7 Tips for Safer Online Shopping

Tis the Season for Cyber Crime: 7 Tips for Safer Online Shopping

The holiday season is upon us and the biggest online shopping sales are right around the corner. Analysts are predicting ecommerce holiday sales will reach 107.4 billion, which is a 13.8% increase from the same period last year. Cyber Monday is set to remain the overall leader in shopping days,

The Enemy You Know (or you think you know)

The Enemy You Know (or you think you know)

A new industry study that reveals more than half of security professionals surveyed say insider threat incidents have become more frequent in the past 12 months. Of the 508 security professionals polled by LinkedIn’s Information Security Community and Crowd Research Partners, 74% of the

Outsourcing security could be the best move you make.

Outsourcing security could be the best move you make.

You feel like you’ve finally gotten this network security issue under control.  Comprehensive and expensive security solutions have been put in place. But to be effective, every one of those solutions needs to be proactively monitored and managed, with their settings reviewed, tweaked and adjusted

Ransomware By The Numbers

Ransomware By The Numbers

Ransomware continues to wreak havoc on organizations of every size. Attack frequency is up, ransom demands are growing.  Every Bitcoin payment provides a new incentive for cyber criminals to improve their technology and methods of attack. The payload contained in most phishing emails is now

Closing the Password Security Gap

Closing the Password Security Gap

A couple of months ago, Verizon’s 2017 Data Breach Report confirmed that 80% of all successful network attacks take place because of weak credentials.  We took that opportunity to review the best methods for creating a strong password.  We’re glad we did, because a new study released last week

When it comes to network security, everything matters.

When it comes to network security, everything matters.

We’ve spent the past month exploring (and busting) a number of myths that have grown up around information security. We know now that remaining compliant with regulations can’t make you secure. We know now that pen tests and vulnerability scans alone won’t keep you on the right side of

Learning from the Equifax Fiasco

Learning from the Equifax Fiasco

143,000,000 Victims.  Any Lessons?     When faced with the almost incomprehensible scope of last month’s Equifax episode, words like “breach” and “hack” seem inadequate to convey the scope of the incident. “Catastrophe” may be closer. Consider:  The number of victims is equivalent to the

Is your stuff enough?

Is your stuff enough?

Think about the technology landscape as it existed at the turn of the century. Having just survived the run up to Y2K, most IT departments were well staffed and adequately funded (for the last time, it seems). All network assets were local, and all servers physical. If you had 500 employees, the

Post-Irma: How did your business fare through the storm?

Post-Irma: How did your business fare through the storm?

With Hurricane Irma in the rearview, first responders are on the roads cleaning debris and restoring power.  Employees are taking down their shutters and slowly returning to work (either remotely or at those offices fortunate enough to suffer little impact from the storm). Business owners are