Protecting Against Insider Threats to Your Organization

How do you guard against employee theft of data without creating an environment of suspicion? By developing and administering an internal security policy, you can keep internal security at a professional level. Here are a few highlights in beginning to consider a plan: Understanding Your Data Monitoring Network Activity Utilizing Data Protection Tools for Various […]

10 Ways to Improve Network Security

The New York Times reported recently on a Computer Security Institute survey of 443 companies and government agencies. They found that 64 percent reported malware infections and the “financial loss from security breaches was $234,000 on average for each organization.” Here are ten ways to improve network security based on the New York Times article. […]

Extending Your Data Center into the Cloud

Computerworld ran a thoughtful article about several organizations that have moved some and/or most of their applications into the cloud.[1] These groups have enjoyed tremendous savings, reduced internal workloads, and enjoyed faster deployments. As any company considers expanding to the web, it is important to process the opportunities and challenges associated with such a move. […]

Underestimating the Consequences of a Data Breach

According to a report from the Ponemon Institute, many small to medium businesses (SMBs) fail to prepare for data breach.[1] In the “State of SMB Cyber Security Readiness: US Study,” Ponemon reports that organizations that had suffered a breach had different expectations from organizations that had not suffered a breach. As a result, many SMBs […]

Cyber Attackers Gain Ground Every Day

In the last few years, government and business cybersecurity experts continue doing better and better, while attackers also continue to do better and better. Steven Chabinsky, former chief of the FBI’s Cyber Intelligence Section, challenges the business and government sectors to adapt, adjust, rethink their approach to cybersecurity or slide backwards. Dennis Fisher over at […]

Towards a Healthcare BI Plan

Healthcare business intelligence can potentially improve patient care and reduce costs when used effectively within a given facility. At the same time, using BI within a healthcare environment comes with a range of challenges due to the critical nature of the environment, the massive amount of complex data that needs accurate interpretation, and the caution […]

Planning for Disasters

How prepared is your business for a hurricane, flooding, power outages, a tornado? According to The Institute for Business & Home Safety an estimated 25% of business never reopen after a major disaster.  Those who do reopen may still face such surmounting obstacles that they end up closing. 75% of the companies who fail to […]

Ransomware: What You Need to Know (Part 1)

What is Ransomware? Ransomware is malware that enables cyber extortion for financial gain. Criminals can hide links to ransomware in seemingly normal emails or web pages. Once ransomware infects a user’s system, it either encrypts critical files or locks a user out of their computer. It then displays a ransom message that demands virtual currency […]

Ransomware: What You Need to Know (Part 3)

Best Practices to Combat Ransomware Take a layered approach to security A firewall and Antivirus combination are not enough to secure an environment against ransomware. Layers of protection are an important and in-depth part of your defense. Manage network traffic Proper management of network traffic leads to better control of what traffic is on the […]