Most Popular Security

Ransomware – Tips to Combat the Threats Enabled From Within

The Wanna Decryptor (aka “WannaCry“) ransomware strain that surfaced over the past couple of weeks, and quickly gained momentum globally, serves as a harsh reminder of the troubles businesses face when putting basic security best practices on the back burner. With software solutions available to handle everything from patch management to more complex functions—such as […]

Read More

How to Handle File Transfer in Secure Networks

In most organizations, regardless of industry, file transfers happen all day, every day. These transfers take place in the forms of data exchanges like email, network shares, homegrown File Transfer Protocol (FTP) tools, and even free online FTP services. Every employee shares information, internally or externally, throughout the day, which raises security concerns. It may […]

Read More

Eye-Opening Discoveries About Help Desk Security and What to Do

It is every customer’s and employee’s right to ask for and receive assistance from the IT help desk. The help desk team is obligated to… help. It is also their sworn duty to maintain the secrecy and confidentiality of any and all privileged information. This means that in addition to providing technical support quickly and […]

Read More

Your Help Desk Can Be a Powerful Ally in Maintaining HIPAA Compliance

Each industry has standards and regulatory compliance concerns. The health care industry arguably has the most well-known, thanks to the Health Insurance and Portability Accountability Act (HIPAA) and its efforts to keep electronic protected health information (ePHI) safe. HIPAA compliance is essential for organizations that store, maintain or transmit ePHI and staying on top of […]

Read More

Is Threat Intelligence For Me?

“Intelligence is the ability to adapt to change.” –Stephen Hawking Search for the term “threat intelligence” and you’ll get 12.3 million hits. Not all of them are relevant to cyber, but still a lot of these hits apply, and you can see why at the RSA conference.  There are many forms of threat intelligence with […]

Read More

Improving Data Privacy in 2016

January 28 is Data Privacy Day (DPD). Observed since 2008, DPD brings awareness to the importance of data privacy and protection. According to the Verizon 2015 Data Breach Investigations Report, about 60% of cyber attackers are able to compromise an organization’s data within minutes. 2016 is going to be no different from a threats perspective, […]

Read More

All Data is Not Created Equal

“Horizontal expansion loses the depth, though excessive depth that only provokes darkness is futile. Therefore a balance between depth and vastness is essential in learning” ― Privavrat Thareia This year, consider spending more time protecting the vast bytes that make up your corporate data. As an IT or security professional, do you know how much data […]

Read More

How to Prevent the Cost of a Data Breach from SQL Injection Attacks

The average total cost of a data breach right now is $3.79 million, according to the 2015 Cost of Data Breach Study: Global Analysis. Cyber attacks are one of the top reasons for this exorbitant sum. Hackers attack websites to gather commercial information, consumer information, or targeted profiles. Data breach attempts need to be thwarted quickly. […]

Read More