2016

What Merchants Need To Know About POS Malware Prevention

December 7, 2016 · steveverbanic · · Comments

Point-of-sale (POS) malware attacks are experiencing a resurgence — a troubling trend for retailers on the brink of peak holiday shopping season. This may explain why most retailers are immediately concerned about cybersecurity. A recent Security Magazine report noted that all respondents in the 2016 BDO Retail RiskFactor Report were concerned about security breaches and […]

Read More

Ransomware: Why Backups Can’t Wait

October 14, 2016 · steveverbanic · · Comments

Ransomware attacks are exploding. Recently, the U.S. Department of Homeland Security and the Canadian Cyber Incident Response Center issued a joint statement warning of the worsening ransomware situation targeting Windows, OS X, and Linux platforms. While prevention is important, malware and malware-less attacks are proliferating and becoming increasingly harder to detect. Organizations can not afford to […]

Read More

Top 10 Reasons to Look at Flash Storage

October 14, 2016 · steveverbanic · · Comments

Trends, such as the increasing number of mobile users and the Internet of Things (IoT), are contributing to an explosion of data, giving us more data points to make decisions. By 2020, we will have 44 trillion gigabytes of data, with more being added every second. Not only is this data necessary for business operations, […]

Read More

Top 5 Tips for Interviewing

October 5, 2016 · steveverbanic · · Comments

I have been a recruiter for a long time… and by long time I mean back in the days of 3 x 5 cards, fax machines, spending prime time smiling and dialing.  So when I meet people that aren’t in the recruiting field they always tell me about a horrible interview story they want to share […]

Read More

How To Approach Encryption Inspection

October 5, 2016 · steveverbanic · · Comments

A full 30% of America’s internet traffic is now encrypted, a number that is expected to double by the end of 2016. SSL-encrypted traffic is rapidly becoming a standard. With the right approach, it can improve data security without compromising employee productivity or creating network maintenance headaches. The Dark Side Of Encryption Nevertheless, there’s a […]

Read More

5 Top Threats To Campus Cybersecurity

September 7, 2016 · steveverbanic · · Comments

With students heading back to campus this month and classes set to resume for another semester, many higher education IT professionals are worrying about the cyber threats that lay ahead. With so much sensitive information at risk, it helps to have a solid idea of the threats that exist and how to deal with them […]

Read More

What to Take Away from the Threat Hunt

September 7, 2016 · steveverbanic · · Comments

Faced with ever more stealthy and insidious attacks, many organizations are pivoting away from reactive security approaches and toward more proactive strategies. One is threat hunting, an exercise in which security actively and aggressively intercepts, tracks and eliminates malicious programs and code before they can wreak havoc on the network. While the biggest benefit is […]

Read More

What You Need To Know About Ransomware

September 7, 2016 · steveverbanic · · Comments

As new generations of highly sophisticated ransomware threaten data security with increasing stealth and ferocity, protecting yourself from this insidious cyber crime wave can feel like an uphill battle. A tactic once primarily launched via email phishing, ransomware authors have honed their powers of deception. Today, they embed malicious ransomware programs in every-day business and […]

Read More

SLAIT Consulting and NetApp: A Cohesive Team Providing the Most Up-to-Date Storage Solutions

August 11, 2016 · steveverbanic · · Comments

More businesses are coming to trust all-flash array as a superior data storage system over the traditional spinning hard disk storage. NetApp operates ubiquitously as an all-flash array provider and has served countless industries from around the globe. It’s no surprise then that the data management company was ranked #2 in the world for all-flash […]

Read More

Breaking the Cyber Kill Chain: Lessons Learned From the Ukrainian Power Grid Hack

July 25, 2016 · steveverbanic · · Comments

In December 2015, a shocking and unprecedented attack took place at three separate power distribution centers in Western Ukraine. These facilities, responsible for controlling and directing electricity to hundreds of thousands of nearby residents, found themselves the target of what could be one of the most sophisticated cyber attacks in history. What Happened? At the […]

Read More

Can Cybersecurity and Connectivity Coexist in Higher Ed?

June 22, 2016 · steveverbanic · · Comments

The open and connected environments in higher education help foster collaboration and innovation. Yet these environments are also creating cybersecurity vulnerabilities. With tight budgets that are focused largely on educational resources, IT teams at colleges and universities are not only constantly competing for funding but also fighting a losing battle against cybercriminals. Higher Ed a […]

Read More

With HIPAA Audits Looming, How Will You Get Around Data Security Roadblocks?

June 22, 2016 · steveverbanic · · Comments

In healthcare, staying HIPAA-compliant is a priority. But the rise of cloud computing, mobility and the Internet of Things (IoT) have added additional complexities that make protecting patient information and staying HIPAA-compliant all the more difficult. With a new round of OCR HIPAA compliance audits scheduled, it’s time for healthcare firms to review their current […]

Read More

Why Your Private Data May Be Safest in the Cloud

April 22, 2016 · steveverbanic · · Comments

Cloud adoption is on the rise, but some still question the security of data in it. Put your mind at ease by understanding the real risks in the cloud and knowing how to avoid them. First it’s important to understand the cloud isn’t going away anytime soon. It simply provides too many business benefits. Not […]

Read More

As Malware Gets Smarter, So Must Your Security Sandbox

March 21, 2016 · steveverbanic · · Comments

“Targeted malware” is a real threat these days, with Verizon showing in its latest Data Breach Investigations Report that 70%-90% of all malware reported was unique to an organization. Even more alarming was the finding that on  average, companies went 205 days between the time they were breached and the day they discovered it. The […]

Read More