IT Security

Home/Posts/IT Security

Top Cyberthreats to Watch for in 2021

By |2020-12-03T13:35:51+00:00November 30th, 2020|Cyber Security, Internet Security, IT Security, Security|

During a year in which the global health crisis brought immeasurable change to our personal and professional lives, it has been hard to determine which has spread faster — the coronavirus itself or the cybersecurity threats that attempt to exploit it. Analysts say cyberattacks have increased by 600 percent since the start of the pandemic [...]

Feds Say Ransomware Payments May Lead to Sanctions

By |2020-11-11T14:18:01+00:00November 11th, 2020|Cyber Security, Internet Security, IT Security, Security|

Chances are, you’ve never heard of The Office of Foreign Assets Control (OFAC). However, if your company is trying to recover from a ransomware attack, you could unwittingly find yourself in OFAC’s crosshairs and subject to business-crippling fines and penalties. OFAC has been called “the most powerful yet unknown agency in the U.S. government.” An [...]

Revised Guidelines Open the Door to Better Password Management

By |2020-11-05T14:33:09+00:00November 4th, 2020|Cyber Security, IT Security, Security|

“Open Sesame!” With this phrase, the title character of the 18th-century folk tale “Ali Baba and the Forty Thieves” was able to gain entry to a secret cavern filled with gold, silver and other riches. The part of the story most people forget is that Ali Baba’s brother was later killed after he forgot the [...]

Why Behavior Analytics Is an Essential Tool in Today’s Threat Environment

By |2020-10-21T02:13:29+00:00October 21st, 2020|Cyber Security, IT Security, Security|

Most conversations about IT security — and investments in IT security — tend to focus on external forces trying to infiltrate a network at the perimeter, steal sensitive data and sell it to the highest bidder. However, many experts agree that insider threats represent a significant security risk to organizations. An insider threat is typically [...]

Three Ways to Boost Email Security

By |2020-09-22T21:27:31+00:00September 22nd, 2020|Internet Security, IT Security, Security|

In 1978, a marketing manager with Digital Equipment Corporation sent an unsolicited electronic message to hundreds of ARPANET users promoting the company’s new mainframe computers. It is the first known instance of spam, and it kicked off four decades worth of unwelcome, unwanted and unrelenting email abuses. Email has since become the de facto standard [...]

Don’t Allow Users to Have Unfettered Access to Data Files

By |2020-09-02T01:26:22+00:00September 2nd, 2020|Cyber Security, IT Security, Security|

Few organizations would give every employee access to HR and accounting systems. But an astonishing number of organizations fail to control access to other sensitive information. A 2019 study by Varonis Data Lab found that 53 percent of companies had at least 1,000 sensitive files that could be accessed by all employees. Almost one-quarter (22 [...]

Frameworks Enable a Best-Practice Approach to Cybersecurity

By |2020-07-21T12:20:42+00:00July 21st, 2020|Cyber Security, Internet Security, IT Security, Regulatory Compliance, Security|

Cybersecurity has never been more difficult. Threats are growing more frequent, sophisticated and costly. Data, devices and other assets keep moving beyond the reach of network perimeter defenses. Increasing government and industry regulations keep adding layers of complexity. If only there was an instruction manual that explained how to deal with it all. Turns out, [...]

Ransomware Payments Produce Unintended Consequences

By |2020-06-30T12:54:43+00:00June 30th, 2020|Backup Recovery, Cyber Security, Internet Security, IT Security, Security|

The University of California at San Francisco announced recently that it paid a $1.14 million ransom to regain access to medical school data that was encrypted during a ransomware attack. The incident illustrates a disturbing trend — ransomware attacks are steadily increasing, as are the ransom amounts being demanded. The average ransom demanded in attacks [...]

How to Ensure Responsive IT Support for Your Work-from-Home Users

By |2020-06-23T23:51:43+00:00June 23rd, 2020|Collaboration, IT Security, IT Services, Mobility|

In our last post, we explained four ways that managed services providers (MSPs) can help support your remote work requirements. By assisting with virtual private networks (VPNs), conferencing and collaboration solutions, cloud services, and cybersecurity, MSPs can help organizations overcome the technical challenges associated with work-from-home strategies. We also recognize that providing technology solutions and [...]

Minimize Firewall Configuration Errors to Boost Security

By |2020-03-17T00:20:30+00:00March 17th, 2020|Cyber Security, Internet Security, IT Security, Security|

Firewalls have been an essential first line of defense in network security for decades, serving as the gatekeeper between internal network resources and the outside world. However, mismanaged or misconfigured firewalls are barely better than having no firewall at all. The massive Capital One breach last year illustrates the danger. A misconfigured firewall rule enabled [...]