5 Building Blocks for Effective Intent-based Network Security

March 27, 2017 · Mary Chavez · · Comments
shutterstock_437098156

The Internet of Things (IoT) is here, and it’s driving big changes in enterprise networks. Gartner finds that nearly half (43%) of businesses worldwide planned to have some kind of IoT implementation by the end of 2017, with average deployment sizes in the billions. How can IT effectively keep the network secure and up and […]

Read More

Building A Culture of Security In Business

February 13, 2017 · Mary Chavez · · Comments
shutterstock_444269305

One of the biggest risks to business network security is the everyday behavior of the people that interact with it. The growing acceptance of this reality has made cybersecurity awareness — a core component of any network protection strategy. As you take steps to build a more cohesive culture of security at your organization, it […]

Read More

3-Point Endpoint Protection Primer

January 25, 2017 · Mary Chavez · · Comments
shutterstock_477334843

Attackers always take the path of least resistance. Today that path is clearly through the endpoint. As recent SANS research shows, user actions at the endpoint represent the most common way threats enter organizations today, with 75% entering via a malicious email attachment, 46% executed by users clicking malicious links in email, and 41% involving […]

Read More

Reality Check: # 2017 Cybersecurity Predictions

January 25, 2017 · Mary Chavez · · Comments
ransomware-blog

Ransomware, attacks from sovereign nations, botnets taking down sites on two continents – the cybersecurity industry saw dramatic changes in the landscape in 2016. Now that we’re almost a month into 2017, it’s time to get real about what’s coming. Trends that shaped 2016 It’s hard to look at the year past and pick out […]

Read More

Higher Education and Cloud: What Are the Challenges?

January 3, 2017 · Mary Chavez · · Comments
shutterstock_383893615

A complex mix of funding schemes, applications, users, devices and more all conspire to make managing IT in today’s higher education environments more of an art than a science. Faced with the need to provide more services, to more constituencies more securely and cost-effectively, institutions increasingly turning to cloud solutions. Higher education is quickly migrating […]

Read More

What Merchants Need To Know About POS Malware Prevention

December 7, 2016 · Mary Chavez · · Comments
shutterstock_223094779

Point-of-sale (POS) malware attacks are experiencing a resurgence — a troubling trend for retailers on the brink of peak holiday shopping season. This may explain why most retailers are immediately concerned about cybersecurity. A recent Security Magazine report noted that all respondents in the 2016 BDO Retail RiskFactor Report were concerned about security breaches and […]

Read More

Ransomware: Why Backups Can’t Wait

October 14, 2016 · Mary Chavez · · Comments
shutterstock_410650657

Ransomware attacks are exploding. Recently, the U.S. Department of Homeland Security and the Canadian Cyber Incident Response Center issued a joint statement warning of the worsening ransomware situation targeting Windows, OS X, and Linux platforms. While prevention is important, malware and malware-less attacks are proliferating and becoming increasingly harder to detect. Organizations can not afford to […]

Read More

Top 10 Reasons to Look at Flash Storage

October 14, 2016 · Mary Chavez · · Comments
shutterstock_462759802

Trends, such as the increasing number of mobile users and the Internet of Things (IoT), are contributing to an explosion of data, giving us more data points to make decisions. By 2020, we will have 44 trillion gigabytes of data, with more being added every second. Not only is this data necessary for business operations, […]

Read More

Top 5 Tips for Interviewing

October 5, 2016 · sysop · · Comments
shutterstock_272194208

I have been a recruiter for a long time… and by long time I mean back in the days of 3 x 5 cards, fax machines, spending prime time smiling and dialing.  So when I meet people that aren’t in the recruiting field they always tell me about a horrible interview story they want to share […]

Read More

How To Approach Encryption Inspection

October 5, 2016 · Mary Chavez · · Comments
shutterstock_362210756 (1)

A full 30% of America’s internet traffic is now encrypted, a number that is expected to double by the end of 2016. SSL-encrypted traffic is rapidly becoming a standard. With the right approach, it can improve data security without compromising employee productivity or creating network maintenance headaches. The Dark Side Of Encryption Nevertheless, there’s a […]

Read More

3 Best Practices for Flash and Enterprise Applications

September 7, 2016 · Mary Chavez · · Comments
shutterstock_283697000

We rely on enterprise applications for everything from lightning fast financial transactions and supply chain tracking to understanding our customers. Our user expectations are that applications will be up and running when they need them with minimal disruption to business. Flash storage is a critical component to meeting those expectations and aligning enterprise application performance, management, […]

Read More

5 Top Threats To Campus Cybersecurity

September 7, 2016 · Mary Chavez · · Comments
shutterstock_150697730 (1)

With students heading back to campus this month and classes set to resume for another semester, many higher education IT professionals are worrying about the cyber threats that lay ahead. With so much sensitive information at risk, it helps to have a solid idea of the threats that exist and how to deal with them […]

Read More

What to Take Away from the Threat Hunt

September 7, 2016 · Mary Chavez · · Comments
shutterstock_314711171

Faced with ever more stealthy and insidious attacks, many organizations are pivoting away from reactive security approaches and toward more proactive strategies. One is threat hunting, an exercise in which security actively and aggressively intercepts, tracks and eliminates malicious programs and code before they can wreak havoc on the network. While the biggest benefit is […]

Read More

What You Need To Know About Ransomware

September 7, 2016 · Mary Chavez · · Comments
ransomware

As new generations of highly sophisticated ransomware threaten data security with increasing stealth and ferocity, protecting yourself from this insidious cyber crime wave can feel like an uphill battle. A tactic once primarily launched via email phishing, ransomware authors have honed their powers of deception. Today, they embed malicious ransomware programs in every-day business and […]

Read More

3 Reasons to Perform a Cyber Threat Assessment

August 31, 2016 · Mary Chavez · · Comments
shutterstock_418806466

A business can’t effectively protect assets and data if it doesn’t understand the threats it’s up against. That’s why it’s critical to perform regular cyber threat assessments — especially when threats change constantly, and network attack surfaces become more porous with the growth of BYOD, the cloud and other technology trends. A cyber threat assessment […]

Read More

SLAIT Consulting and NetApp: A Cohesive Team Providing the Most Up-to-Date Storage Solutions

August 11, 2016 · Mary Chavez · · Comments
NetApp

More businesses are coming to trust all-flash array as a superior data storage system over the traditional spinning hard disk storage. NetApp operates ubiquitously as an all-flash array provider and has served countless industries from around the globe. It’s no surprise then that the data management company was ranked #2 in the world for all-flash […]

Read More

Breaking the Cyber Kill Chain: Lessons Learned From the Ukrainian Power Grid Hack

July 25, 2016 · Mary Chavez · · Comments

In December 2015, a shocking and unprecedented attack took place at three separate power distribution centers in Western Ukraine. These facilities, responsible for controlling and directing electricity to hundreds of thousands of nearby residents, found themselves the target of what could be one of the most sophisticated cyber attacks in history. What Happened? At the […]

Read More

Can Cybersecurity and Connectivity Coexist in Higher Ed?

June 22, 2016 · Mary Chavez · · Comments
shutterstock_329792597

The open and connected environments in higher education help foster collaboration and innovation. Yet these environments are also creating cybersecurity vulnerabilities. With tight budgets that are focused largely on educational resources, IT teams at colleges and universities are not only constantly competing for funding but also fighting a losing battle against cybercriminals. Higher Ed a […]

Read More

With HIPAA Audits Looming, How Will You Get Around Data Security Roadblocks?

June 22, 2016 · Mary Chavez · · Comments
shutterstock_334486298 (1)

In healthcare, staying HIPAA-compliant is a priority. But the rise of cloud computing, mobility and the Internet of Things (IoT) have added additional complexities that make protecting patient information and staying HIPAA-compliant all the more difficult. With a new round of OCR HIPAA compliance audits scheduled, it’s time for healthcare firms to review their current […]

Read More

Why Your Private Data May Be Safest in the Cloud

April 22, 2016 · Mary Chavez · · Comments
Doorway revealing cloudy sky  in blue and black computer matrix

Cloud adoption is on the rise, but some still question the security of data in it. Put your mind at ease by understanding the real risks in the cloud and knowing how to avoid them. First it’s important to understand the cloud isn’t going away anytime soon. It simply provides too many business benefits. Not […]

Read More

As Malware Gets Smarter, So Must Your Security Sandbox

March 21, 2016 · Mary Chavez · · Comments

“Targeted malware” is a real threat these days, with Verizon showing in its latest Data Breach Investigations Report that 70%-90% of all malware reported was unique to an organization. Even more alarming was the finding that on  average, companies went 205 days between the time they were breached and the day they discovered it. The […]

Read More