Category

Uncategorized
hooded man with ACE card
Hacktivism is the “the use of computer technology to achieve a political agenda through legally ambiguous means.” However, hacktivism differs from cyberterrorism. Cyberterrorism involves hacking to cause severe harm, like grave economic damage or outages that cause a loss of life.  This subset of hacking can have various motivations, and usually involves causes associated with...
Read More
Data breaches are events where certain confidential information is accessed without proper authorization. this goes further by having copies of that data distributed. The average data breach in 2020 caused roughly 3.92 million (USD) in damages. The core concept of a data breach is the fact that data confidentiality has been compromised. Data breaches can...
Read More
Photo by Philipp Katzenberger on Unsplash What is “Endpoint Security“ While the concept of “Endpoint Security” is simple, its execution and operation aren’t. What exactly is “Enpoint Security” and what is an “Endpoint Security Solution“ Endpoint security is the concept of security measures placed at each “endpoint” or device accessing an enterprise network. This can include desktops, laptops,...
Read More
Zoom jumped from 10 million meeting participants per day (December 2019) to over 200 million daily meeting participants (March 2020). This has led to an unprecedented amount of attention being pointed at Zoom, be it from general public use or from those looking to exploit potential chinks in Zoom’s platform. That attention quickly evolved into...
Read More
FIVE STEPS TO COMPLIANCEby: Michael Hall, Chief Information Security Officer Despite different industries being required to follow differently named guidelines, there’s a pretty good overlap for those information security items that IT really needs to worry about.Although there will be some personal information that may not fall under any compliance standards, from an IT perspective,...
Read More
🎁 Tips for Safe Online Holiday shopping. 🛍 In 2018, 8% of consumers surveyed said they were victims of Identity theft during the holiday season. As black Friday approaches 56% of holiday shoppers plan to make purchases online in 2019. Before you shop this holiday season, we have prepared a list of cyber tips for...
Read More
Written by: Deepen Desai Once seen as the ultimate protection for data being transmitted over the internet, encryption has become a vast playground for cybercriminals. Zscaler ThreatLabZ, the research organization at Zscaler, analyzed the encrypted traffic traversing the Zscaler cloud in the second half of 2018 and prepared a report of our findings. The Zscaler cloud processes...
Read More
Written by Jackie Castelli from CrowdStrike- While there is much discussion today about potential weaknesses in the hardware supply chain, given the recent attacks attributed to China, the software supply chain has already proven to be vulnerable with numerous attacks covered. Yet, even though these attacks seem to be making headlines more frequently, they are far...
Read More
data center decommissioning
Data Center Decommissioning Tips Investing in new equipment, applications, and technology solutions is a top priority for many IT and security professionals. But when it comes to “out with the old and in with the new”, what exactly happens to the old legacy systems, applications and hardware equipment? In this blog post, we look at...
Read More
1 2