Category

Uncategorized
As we remain vulnerable to the constantly-evolving financial frauds and cybersecurity threat landscape and in light of recent events such as the QuickBooks payment scams, it’s important to be vigilant against any type of deception used to financially despair a person or organization — otherwise known as fraud.  Fraud takes many forms depending on the...
Read More
Understanding Today’s Malware HermeticWiper and PartyTicket   Cyberwarfare has become its own “battlefield” in today’s global conflicts. The ability to slow down communications between military resources, shut down entire systems, and prevent intelligence from being shared amongst departments can give even a relatively small military a leg up while impacting the physical battlefield. With all that...
Read More
Endpoint detection & response (EDR) is a cybersecurity solution consisting of multiple tools (including AI) that monitor for potential security threats and address them head on. This technology works by constantly collecting information from endpoint devices connected to an organization’s network such as desktops, servers, laptops, or tablets. By “information,” we are mostly referring to...
Read More
Edge computing. To fully digitize the last mile of business, you need to distribute compute power where it’s needed most — right next to IoT devices that collect data from the real world. As technology extends deeper into every aspect of business, the tip of the spear is often some device at the outer edge...
Read More
From ransomware schemes to supply chain attacks, this year melded classic hacks with extraordinary circumstances WHAT A WAY to kick off a new decade. 2020 showcased all of the digital risks and cybersecurity woes you’ve come to expect in the modern era, but this year was unique in the ways Covid-19 radically and tragically transformed life around the...
Read More
Insider Risk is defined as  “The risk an insider is any person with authorized access to an organization’s resources to include personnel, facilities, information, equipment, networks, or systems”. A lot of organizations struggle with insider risk because the very nature of the risk comes from those who you trust with your systems and authorizations. From...
Read More
Cybersecurity compliance isn’t something you can accomplish easily. There are an overwhelming number of acronyms, controls, and laws that leave many scratching their head. Compliance requirements vary and can be imposed by law, non-government regulatory bodies, and even private industry groups. Cybersecurity Compliance involves meeting various “conditionals” or controls to protect the confidentiality, integrity, and...
Read More
An incident response plan is a“set of instructions to help IT staff detect, respond to, and recover from network security incidents. These types of plans address issues like cybercrime, data loss, and service outages that threaten daily work.” Generally, an Incident Response plan is created before any incidents occur. Although, most companies have taken a...
Read More
According to Gartner, Software Defined – Wide Area Network (SD-WAN) does the following:  “SD-WAN solutions provide a replacement for traditional WAN routers and are agnostic to WAN transport technologies. SD-WAN provides dynamic, policy-based, application path selection across multiple WAN connections and supports service chaining for additional services such as WAN optimization and firewalls.” Software Defined –...
Read More
According to Gartner, Identity and Access Management (IAM) is the security discipline that enables the right individuals to access the right resources at the right times for the right reasons. IAM addresses the challenging task of ensuring appropriate access to resources across increasingly diverse technology environments as well as keep up with the necessary regulatory...
Read More
1 2 3 4