News

Submit
2017 Data Breaches: Here's What We Learned

2017 Data Breaches: Here's What We Learned

Another year has passed and along with it another set of massive data breaches to look back upon.  In a digital age when we are providing more and more personal data to businesses and conducting most of our financial transactions online, we would expect companies to keep up with the threat

The SLPowers Speakers Series

The SLPowers Speakers Series

Whether we’re educating technology professionals on the latest trends in cybersecurity or translating industry jargon into plain English for executives and other non-technical audiences, the SLPowers Speakers Series represents a “Sales Free Zone.”   Our mission is to advance the

Why You Need SIEM

Why You Need SIEM

Security information and event management (SIEM) software gives security professionals both insight into and a track record of the activities within their IT environment.  It’s a group of complex technologies that together, provide a centralized bird’s-eye-view into a network’s infrastructure.

Tis the Season for Cyber Crime: 7 Tips for Safer Online Shopping

Tis the Season for Cyber Crime: 7 Tips for Safer Online Shopping

The holiday season is upon us and the biggest online shopping sales are right around the corner. Analysts are predicting ecommerce holiday sales will reach 107.4 billion, which is a 13.8% increase from the same period last year. Cyber Monday is set to remain the overall leader in shopping days,

The Enemy You Know (or you think you know)

The Enemy You Know (or you think you know)

A new industry study that reveals more than half of security professionals surveyed say insider threat incidents have become more frequent in the past 12 months. Of the 508 security professionals polled by LinkedIn’s Information Security Community and Crowd Research Partners, 74% of the

Outsourcing security could be the best move you make.

Outsourcing security could be the best move you make.

You feel like you’ve finally gotten this network security issue under control.  Comprehensive and expensive security solutions have been put in place. But to be effective, every one of those solutions needs to be proactively monitored and managed, with their settings reviewed, tweaked and adjusted

Ransomware By The Numbers

Ransomware By The Numbers

Ransomware continues to wreak havoc on organizations of every size. Attack frequency is up, ransom demands are growing.  Every Bitcoin payment provides a new incentive for cyber criminals to improve their technology and methods of attack. The payload contained in most phishing emails is now

Closing the Password Security Gap

Closing the Password Security Gap

A couple of months ago, Verizon’s 2017 Data Breach Report confirmed that 80% of all successful network attacks take place because of weak credentials.  We took that opportunity to review the best methods for creating a strong password.  We’re glad we did, because a new study released last week

When it comes to network security, everything matters.

When it comes to network security, everything matters.

We’ve spent the past month exploring (and busting) a number of myths that have grown up around information security. We know now that remaining compliant with regulations can’t make you secure. We know now that pen tests and vulnerability scans alone won’t keep you on the right side of

Learning from the Equifax Fiasco

Learning from the Equifax Fiasco

143,000,000 Victims.  Any Lessons?     When faced with the almost incomprehensible scope of last month’s Equifax episode, words like “breach” and “hack” seem inadequate to convey the scope of the incident. “Catastrophe” may be closer. Consider:  The number of victims is equivalent to the