Category

Uncategorized
You have an endpoint protection solution, email security gateway, antimalware, and a plethora of other security tools at your fingertips. How do you make sense of it all, to see the whole picture? The simple answer is a SIEM or Security Information and Event Management. A SIEM solution takes all the data generated by your...
Read More
What is an “Email Security Gateway”? An Email Security Gateway is one of the first lines of defense we deploy against certain cyberthreats to our organizations. Spam, phishing attacks, and email compromise are just a few of these threats that email security gateways block. Most email solutions like G-suite and Office365 offer some baseline gateway...
Read More
Spyware is a type of malware that infects your PC or mobile device and gathers information about you, including the sites you go to, usernames and passwords, payment information, and the emails you send and receive. Similarly, stalkerware is a type of software or application that spies on victims. Stalkerware apps are capable of a plethora...
Read More
VPNs (Virtual Private Networks) in theory provide anonymity and secure passage to your online destination. What we’ve increasingly seen is VPN companies go through their own security breaches and exposing users internet logs. Even when a VPN provider claims that it keeps no logs, it can simply be marketing in a way where that might...
Read More
hooded man with ACE card
Hacktivism is the “the use of computer technology to achieve a political agenda through legally ambiguous means.” However, hacktivism differs from cyberterrorism. Cyberterrorism involves hacking to cause severe harm, like grave economic damage or outages that cause a loss of life.  This subset of hacking can have various motivations, and usually involves causes associated with...
Read More
Data breaches are events where certain confidential information is accessed without proper authorization. this goes further by having copies of that data distributed. The average data breach in 2020 caused roughly 3.92 million (USD) in damages. The core concept of a data breach is the fact that data confidentiality has been compromised. Data breaches can...
Read More
Photo by Philipp Katzenberger on Unsplash What is “Endpoint Security“ While the concept of “Endpoint Security” is simple, its execution and operation aren’t. What exactly is “Enpoint Security” and what is an “Endpoint Security Solution“ Endpoint security is the concept of security measures placed at each “endpoint” or device accessing an enterprise network. This can include desktops, laptops,...
Read More
Zoom jumped from 10 million meeting participants per day (December 2019) to over 200 million daily meeting participants (March 2020). This has led to an unprecedented amount of attention being pointed at Zoom, be it from general public use or from those looking to exploit potential chinks in Zoom’s platform. That attention quickly evolved into...
Read More
FIVE STEPS TO COMPLIANCEby: Michael Hall, Chief Information Security Officer Despite different industries being required to follow differently named guidelines, there’s a pretty good overlap for those information security items that IT really needs to worry about.Although there will be some personal information that may not fall under any compliance standards, from an IT perspective,...
Read More
🎁 Tips for Safe Online Holiday shopping. 🛍 In 2018, 8% of consumers surveyed said they were victims of Identity theft during the holiday season. As black Friday approaches 56% of holiday shoppers plan to make purchases online in 2019. Before you shop this holiday season, we have prepared a list of cyber tips for...
Read More
1 2 3 4