2018

The Ins and Outs of Sandboxing Technology

August 29, 2018 · Mary Chavez · · Comments

It has long been a strategy to try to detect malware by monitoring suspicious behavior. However, the more sophisticated malware becomes, the harder it is to detect.  That’s where sandboxing can help: Sandboxing allows organizations to install and run malware in an enclosed environment – separated from the corporate to reduce the risk of infected […]

Read More

The 5 Most Vulnerable Ransomware Entry Points to Your Organization

July 18, 2018 · Mary Chavez · · Comments

Employee cyber security awareness has no doubt risen in recent years due to the endless barrage of highly-publicized cyber attacks waged on businesses and individuals, including WannaCry, Petya and Bad Rabbit. While ransomware, malware and other methods have driven companies to take more proactive measures, you may still have multiple entry points that are vulnerable […]

Read More

Is Your Security Operations Center Equipped to Handle the Growing Ransomware Threat?

July 7, 2018 · Mary Chavez · · Comments

Ransomware poses a threat to organizations of all sizes but can be particularly devastating for small and midsized businesses (SMBs) that often lack the technology, resources and funding that larger enterprises have at their disposal to combat attacks.  After all, the financial toll of a ransomware attack extends far beyond the ransom itself. Businesses must invest […]

Read More

5 Signs Your Organization is Vulnerable to a Ransomware Attack

June 23, 2018 · Mary Chavez · · Comments

Data breaches are no longer only a problem for security professionals, but for organizations as a whole. According to last year’s Official Annual Cybercrime Report, cybercrime damages will cost the world $6 trillion annually by 2021, up from $3 trillion in 2015. Ransomware attacks, in particular, have many organizations playing security catch up due to […]

Read More

The Top 5 Security Threats for 2018

April 18, 2018 · Mary Chavez · · Comments

We are now well into 2018. Though we have left the large security breaches of 2017 behind, their lessons remain.  New challenges will arise in the coming year as well. In this post, we’ll review the 5 top security threats for 2018 and how your team can respond to each. 1. Ransomware The most prominent […]

Read More

3 Best Practices for Flash and Enterprise Applications

February 23, 2018 · steveverbanic · · Comments

We rely on enterprise applications for everything from lightning fast financial transactions and supply chain tracking to understanding our customers. Our user expectations are that applications will be up and running when they need them with minimal disruption to business. Flash storage is a critical component to meeting those expectations and aligning enterprise application performance, management, […]

Read More

3 Reasons to Perform a Cyber Threat Assessment

February 21, 2018 · steveverbanic · · Comments

A business can’t effectively protect assets and data if it doesn’t understand the threats it’s up against. That’s why it’s critical to perform regular cyber threat assessments — especially when threats change constantly, and network attack surfaces become more porous with the growth of BYOD, the cloud and other technology trends. A cyber threat assessment […]

Read More

PCI DSS 3.2 Effective Feb. 1st

February 21, 2018 · steveverbanic · · Comments

Just a reminder that the update for PCI DSS 3.2 from last year included a new requirement regarding multi-factor authentication which goes into effect on Feb 1st that includes the following requirement “Incorporate multi-factor authentication for all non-console access into the CDE for personnel with administrative access.” PCI Cardholder Data Environment and Multi-Factor Authentication The rule affects […]

Read More

The Costs of Hiring and Retaining IT Security Staff

February 21, 2018 · steveverbanic · · Comments

Anyone considering building an internal IT security team has run up against the realities of hiring, training, and retaining top cybersecurity talent. Qualified employees can be tricky and expensive to find and even more expensive to recruit and retain. These factors pose hardships on CIOs/CISOs, and stem from multiple factors in the cyber security space, […]

Read More

The Costs of Hiring and Retaining IT Security Staff

January 30, 2018 · steveverbanic · · Comments

Anyone considering building an internal IT security team has run up against the realities of hiring, training, and retaining top cybersecurity talent. Qualified employees can be tricky and expensive to find and even more expensive to recruit and retain. These factors pose hardships on CIOs/CISOs, and stem from multiple factors in the cyber security space, […]

Read More