Category: Security

Atlassian Hosting: Advantages of using a FedRAMP-Authorized Provider

One of the most challenging topics any IT team might find themselves struggling with is Federal security compliance.  FedRAMP compliance is notoriously difficult to achieve. Layering on the complexity of supporting a development team who needs specific application support for their Atlassian dev tools can make this challenge seem impossible. That’s where a third-party hosting… Read more »

Sound Phishy? Legit VS Phishing Emails

On a daily basis, organizations and individuals are subjected to attempted phishing scams. With the constant barrage of malicious emails, it’s understandable why so many fall victim to ransomware or other malware. After all, occasionally you’ll find an email that looks authentic enough to win us over (who wouldn’t want to wire an advance fee… Read more »

Game Plan for Preventing Health Record Breaches

The healthcare sector was hit hard last year by data breaches according to the ITRC 2017 Data Breach Report. The industry incurred a total of 374 data breach incidents, representing nearly 25% of total breaches throughout the year. These statistics are unfortunate, but not surprising. Every other week we see another prominent health system falling victim… Read more »

DNS Services: What’s a safe bet for finance?

After your company has decided that a managed Domain Name System (DNS) solution is the right move, there are some important next steps you should take. Surfing the web, you never really think about your DNS. If you type in a website address and immediately have access to it, all is well. Once considered secure, standard… Read more »

More Banking, Less Hacking: Protecting your Financial Data

John Dillinger. Bonnie and Clyde. Butch Cassidy and the Sundance Kid … The most notorious bank robbers are long gone – as are the days when you could actually put a name and face to the person committing the heist. However, robberies are not the only concern for today’s financial institutions or their clients. The… Read more »

Top 5 Ways to Reduce Atlassian Security Stress

Stress is a common part of having a job in IT, but some stress can be good.  It keeps you on your toes, looking for what might be an issue, and keeps you from being completely surprised by unexpected risks. However, security stress can become paralyzing, and inhibit your ability to make decisions because you’re… Read more »

Does Covering your Webcam Make You Paranoid or Proactive?

It glares at you, often for several hours at a time. You travel with it. You may never use it, but always have it. Webcams are now a staple for our laptops, tablets, and even our phones. As with every aspect of our technologically-inclined society, webcams are not as unassuming as they seem. You’re NOT… Read more »

5 Biggest Enterprise Cloud Trends of 2018

While the cloud and its role in enterprise technology has evolved significantly in recent years, Forrester analysts predict 2018 will be the year tech leadership works towards locking-in cloud computing for the future. Analysis published in Forbes states that enterprises are no longer questioning whether the cloud is the best choice, “they now scramble to… Read more »

Our Response to Meltdown and Spectre

To All Contegix Customers, Contegix would like to address computer vulnerabilities named Meltdown and Spectre that have been in the news recently and detail the steps we are taking to protect your environments. Computer hardware manufacturers and other core industry parties were informed of these vulnerabilities in November 2017 and have been working to address… Read more »

5 Super Spooky Facts About Shadow IT

What you don’t know about your organization’s unauthorized technology could be a major risk to your firm’s security, compliance, and IT performance. The idea of shadow IT is technically defined as “information technology projects that are managed outside of, and without the knowledge of, the IT departments.” By all accounts, shadow IT is growing at… Read more »