This Month in Cyber Security October Preview (2:39)

New cyber threats emerge on a weekly basis, but are all of them relevant to your organization? Each month, our security team hosts a 30-minute webinar to discuss the latest threats and breakdown their applicability to small and medium-sized organizations, and cost-effective steps to mitigate risk. October was Cyber Security Awareness Month and, as usual, [...]

By | 2018-12-18T12:01:03+00:00 November 7th, 2018|Security Solutions|0 Comments

The Business of Hacking your Business

Whether its ransomware, credential compromise, distributed denial of service, or phishing: hacking your business has itself turned into a business. There are entire organizations dedicated to targeting networks and infrastructure. Because of the nature of the economy, there is always someone who benefits from a disruption. Government, businesses, and schools are all potential targets. No [...]

By | 2018-12-18T12:04:59+00:00 May 16th, 2018|Security Solutions|Comments Off on The Business of Hacking your Business

This Month in Cyber Security: What are the New Risks, How Do They Impact You, and How Can You Protect Yourself?

New cyber threats emerge on a weekly basis but are all of them relevant to your organization? Each month, our security team will host a 30-minute webinar to discuss the latest threats and breakdown their applicability to small and medium-sized organizations, and cost-effective steps to mitigate risk. Register for this event If you encounter any [...]

By | 2017-10-09T13:06:47+00:00 October 31st, 2017|0 Comments

Cyber security, it’s the culture . . .

WannaCry?  Understandable, it’s a scary – and forewarned of – development in cyber attack tactics and capabilities.  However, one often understated aspect of the WannaCry attack concerns the tactic that ended up effectively stopping it dead in its tracks and the elements that lead to the use of this tactic. What secret weapon was [...]

By | 2018-12-18T12:13:33+00:00 June 14th, 2017|Security Solutions|Comments Off on Cyber security, it’s the culture . . .

Have you established your security baseline?

With security breaches making front page news on a near-daily basis, cyber security has become top-of-mind for many companies. Further, the risk of a data breach is not only keeping IT staffs awake at night; it’s also keeping presidents, owners, department directors, and executives awake at night. Before we can start taking steps to [...]

By | 2018-12-18T12:13:53+00:00 May 26th, 2017|Security Solutions|Comments Off on Have you established your security baseline?

Can You Make the PIPA Compliance Cut?

The traditional business way of looking at information and cyber security has been focused on a data or record cost basis.  Makes sense after all - algorithmic connections between revenue, liability, and data are fairly easily created and central to the processes of many organizations.  Likewise, business processes are often built around information and data [...]

By | 2018-12-18T12:15:50+00:00 April 19th, 2017|Security Solutions|Comments Off on Can You Make the PIPA Compliance Cut?

Azure – the Aspen of security

Insecurity through maturity obscurity. That's my quip conclusion about the history of IT security, after researching briefly into the history of security tools deployed over the years. If diagrammed out, the history of IT security would look like an aspen forest, not a tree. Thousands of different security products, with varied maturities of each product, [...]

By | 2018-12-18T12:15:37+00:00 April 10th, 2017|Security Solutions|Comments Off on Azure – the Aspen of security

How to Prepare your End Users to Fight Against Cyber Hackers – Ransomware Series Part 8

This may be hard to believe, but the majority of breaches that occur are not because there are so many super smart hackers out there taking the time to decipher your company’s weak passwords or open ports in your network. Breaches are likely caused by your end users - your employees. How can your organization combat [...]

By | 2018-12-18T12:16:17+00:00 April 3rd, 2017|Security Solutions|Comments Off on How to Prepare your End Users to Fight Against Cyber Hackers – Ransomware Series Part 8

What does a Cyber Hacker really want? – Ransomware Series Part 6

There are several things that Cyber Hackers really want with you and your environment. Sure they want to make money and exploit your data, but we're talking the granular things that Cyber Hackers want... So what is it, you ask? It's simple – they want 3 things… They want to find a way to get [...]

By | 2018-12-18T12:16:56+00:00 March 10th, 2017|Security Solutions|Comments Off on What does a Cyber Hacker really want? – Ransomware Series Part 6