Cyber Security Threats to Watch For

We are mid-year and cyber security threats are still growing and evolving at a rapid speed. Software and hardware vendors are trying to keep up with the demands in the cyber landscape. The cyber security world is always evolving – the good guys develop new techniques to block the bad guys, the bad guys try [...]

By | 2018-12-18T12:11:54+00:00 August 25th, 2017|Security Solutions|Comments Off on Cyber Security Threats to Watch For

Microsoft 365 and Peters & Associates: Secure Cloud Productivity, the Experts to Make it Real

1+1+1=3: There are no gimmicks here - Peters & Associates delivers secure productivity with Microsoft 365 (formerly “Secure Productive Enterprise”). 1  Microsoft produces excellent security products using $10 Billion in annual Research & Development with over $2 Billion funneled directly to security efforts. +1   Peters & Associates is a gold-certified and industry-recognized leader in delivery of these [...]

By | 2018-12-18T12:12:21+00:00 July 26th, 2017|Security Solutions|Comments Off on Microsoft 365 and Peters & Associates: Secure Cloud Productivity, the Experts to Make it Real

This Month in Cyber Security: What are the New Risks, How Do They Impact You, and How Can You Protect Yourself?

New cyber threats emerge on a weekly basis, but are all of them relevant to your organization? Each month, our security team will host a 30 minute webinar to discuss the latest threats and breakdown their applicability to small and medium-sized organizations, and cost-effective steps to mitigate risk. Register for this event If you encounter [...]

By | 2017-06-05T09:21:30+00:00 June 27th, 2017|0 Comments

Do You Know Your Security Risks?

A Reality Check for Business Decision-Makers, including Executives, Directors, and Owners Who identifies technology threats for your organization? What security framework have you implemented to reduce risk? Where are you the most vulnerable? When disaster strikes will you be prepared? Why could you be a target? How will you recover? Learn from our panel of experts in cybersecurity, [...]

By | 2017-06-05T09:22:31+00:00 June 15th, 2017|0 Comments

Cyber security, it’s the culture . . .

WannaCry?  Understandable, it’s a scary – and forewarned of – development in cyber attack tactics and capabilities.  However, one often understated aspect of the WannaCry attack concerns the tactic that ended up effectively stopping it dead in its tracks and the elements that lead to the use of this tactic. What secret weapon was [...]

By | 2018-12-18T12:13:33+00:00 June 14th, 2017|Security Solutions|Comments Off on Cyber security, it’s the culture . . .

Guardians of Your Galaxy Recap

Last week, we hosted a private screening of Guardians of the Galaxy Vol. 2. The movie and the presentations didn’t disappoint. If you were unable to join us, here’s what you missed: The Movie Guardians of the Galaxy Vol. 2 picked up where the first installment of the series left off. Our band of unlikely [...]

By | 2018-12-18T12:14:22+00:00 May 15th, 2017|Security Solutions|Comments Off on Guardians of Your Galaxy Recap

Have you checked out our Defending Your Data eBook?

Peters & Associates' Vice President of Business Strategy describes some of his key takeaways from our new eBook - "Defending your Data: Practical Security for Today's Business." This eBook explains how to design a data-centric security strategy that prioritizes your most important data. Here's what Bruce had to say: [...]

By | 2018-12-18T12:14:32+00:00 May 5th, 2017|Security Solutions|Comments Off on Have you checked out our Defending Your Data eBook?

Don’t Click That! Oops, too late.

All organizations have email.  Most organizations have heard of ransomware and zero-day malware. Did you know that 59% of the time, ransomware comes in via email?* Why did my organization let it in? What should I know? As our Ransomware Guide explains in detail, there are many people, process, and technology improvements that can [...]

By | 2018-12-18T12:15:16+00:00 May 3rd, 2017|Security Solutions|Comments Off on Don’t Click That! Oops, too late.

Manufacturing Meets Security

In April of 2015, NIST published the first public draft of something called SP800-171 which describes requirements for protecting controlled unclassified information on nonfederal information systems and organizations.  The government also published a regulation (DFARS 252.204-7012) that states that any entity that collects, develops, receives, transmits, uses, or stores defense information in support of [...]

By | 2018-12-18T12:15:27+00:00 April 26th, 2017|Security Solutions|Comments Off on Manufacturing Meets Security

Can You Make the PIPA Compliance Cut?

The traditional business way of looking at information and cyber security has been focused on a data or record cost basis.  Makes sense after all - algorithmic connections between revenue, liability, and data are fairly easily created and central to the processes of many organizations.  Likewise, business processes are often built around information and data [...]

By | 2018-12-18T12:15:50+00:00 April 19th, 2017|Security Solutions|Comments Off on Can You Make the PIPA Compliance Cut?