Windows 10 is the newest operating system released by Microsoft. It was released for purchase in 2015. Quite a few years have passed since the release date, so the time finally give in and update your computer operating system is now. Upgrading to Windows 10 is a good idea for many reasons ranging from safety […]
Data Encryption Part 2: What Should Your Company Encrypt?
If you’ve been following our recent data encryption series, you know that protecting against cyber attacks is incredibly important. In our last post, we went over exactly what data encryption is, the types of data encryption methods, and how data encryption benefits organizations of all kinds. Next, it’s important to understand the type of data […]
Protection Against Malvertising

A malvertising network has placed malevolent ads on over 700 domains including such major sites as Amazon, Youtube, and Yahoo. Malvertising is not new, but the current network dubbed “Kyle and Stan” by Cisco security researchers has clever techniques to to avoid detection and spread the attack on major domains. Companies can be vulnerable to the […]
Defending Against Insider Threats (Part 2)
Insider Threats can cripple an organization, but a multi-layered security strategy can reduce the likelihood of success. Some of the best practices for guarding against insider threats also apply a range of security issues. When developing your overall security plan, it is important to prioritize implementation as well as establish a ranking of most critical […]
Defending Against Insider Threats (Part 1)

In their “Common Sense Guide to Mitigating Insider Threats 4th Edition,” CERT provides an exhaustive set of recommendations for defending against insider threats. This raises the question, “Can a company actually defend against insider threats?” Insider threats can be stopped, but it will require a layered approach throughout the company. Like many security issues companies […]
What are Insider Threats?

The age-old risk of insider threats is making headlines. Insider threats are threats that arise from access to vital company information, goods, and/or networks. Insider threats are not limited to employees but could also arise from contractors, partners and anyone else who has vital access to goods, data, or networks. Consider some of the following […]
What is a DDoS Attack?

The speed and number of DDoS attacks have dramatically increased over the past few years. By some estimates DDoS attack occur at the rate of about 28 per hour. [1] A DDoS attack attempts to make a website or online service inaccessible by overwhelming the server using multiple sources of attack. The object of these […]
10 Smart Government IT Trends

In a recent symposium on smart government, Gartner Research analysts suggested that social, mobile, cloud and information are converging and driving innovation that will help establish and develop smart governments. Gartner offers 10 related IT trends that will play a key role in the coming years (see Gartner Newsroom). What is smart government? It might […]
Preparing for Bring Your Own Cloud

Bring your own cloud is fast emerging as a challenge that must be addressed. In some ways the challenges of BYOD (bring your own device) are connected to the challenge of bring your own cloud. The adoption of smartphones, tablets and other wireless devices has been accompanied by the rapid growth of customizable applications that […]
Avoiding Risky Security Habits

The recent Target and Neiman Marcus breaches should be a timely reminder for business leaders to invest in vigilant security habits. Unfortunately, many small to medium business may think of these rampant breaches as threats to the big companies. When it comes to security threats, no business is immune. Consumers in general, practice risky security […]