Top Menu

Archive | Network and Desktop Security


How User Awareness Proactively Protects Your Company from Phishing Attacks

When we say that nobody is safe from today’s modern phishing attacks, we do mean nobody. A 2016 study commissioned by Wombat Security reports up to two-thirds of surveyed organizations suffered targeted, personalized phishing attacks (known as “spear phishing”), an increase of 22 percent from the previous year. A separate study breaks down the costs […]

Continue Reading 0

Why Vulnerability Scanning is Now a Necessity for Your Business

You can build the strongest firewall money can buy, but aiming for complete invulnerability to outside threats is a fool’s game. Today’s IT infrastructure is simply too complex to be completely safe from intrusions: the mind-boggling variety of operating systems, device drivers, applications and other executables on a single system open it to new and […]

Continue Reading 0

It’s Beginning to Look a lot Like Breach-mas…

The holidays are upon us, and it’s a great occasion to celebrate. However, it’s also a great occasion for hackers to take advantage of an exposed business. While you’re celebrating, is there somebody watching your IT infrastructure and assuring it’s not breached? If your answer is anything other than “yes,” then you need to think: […]

Continue Reading 0

The DYN DDoS attack should be a warning sign for businesses

This morning, DYN, one of the largest providers of managed Domain Name System records for some of the internet’s biggest companies, faced a Distributed Denial of Service (DDoS) Attack. Sites including Amazon, Twitter, Soundcloud, and Reddit were affected. People across the country, though more-so on the East Coast, found these sites inaccessible. Dyn continues to […]

Continue Reading 0

Is Your Company Suffering the Effects of “Security Fatigue”?

  You have a hard enough time making decisions for the benefit of your whole enterprise. Add the numerous decisions you have to make with regard to cybersecurity alone (“What password do I use?” “Who gets access to sensitive data?”) and it’s no surprise that some simply give up. A new study from the National […]

Continue Reading 0

Are you as ready for the hackers as they are for you?

Ready or not, as the hacking community continues to evolve law firms have become a definitive target. The legal industry has typically struggled to stay in front of the technology curve and many still do not have formal controls in place to adequately address the rapidly growing demand of cybersecurity. Usually security is at the top of […]

Continue Reading 1
it security plan

Characteristics of a Good Information Security Plan

Three Components of a Successful Information Security Plan You Shouldn’t Count Out Do you have your security priorities all wrong? A 2014 study by Dell reports that over 75% of respondent organizations admitted to security breaches over the past year, but less than 20% prioritized the prediction and management of previously-unknown threats. “Organizations are being […]

Continue Reading

If Your Business Depends on Data, You Need a Security Operations Center

Only the gullible and foolhardy wait for cyberthreats to appear on their doorstep before taking any action. The smart money is on the proactive approach: investing in threat monitoring and timely detection to stop a security breach from ever darkening your mainframe. Many enterprises now find that expanding detection capabilities begins with setting up a […]

Continue Reading