Category: Security

5 Super Spooky Facts About Shadow IT

What you don’t know about your organization’s unauthorized technology could be a major risk to your firm’s security, compliance, and IT performance. The idea of shadow IT is technically defined as “information technology projects that are managed outside of, and without the knowledge of, the IT departments.” By all accounts, shadow IT is growing at… Read more »

The DO’s and DON’Ts of Password Protection

Passwords are your first line of defense against hackers and malicious software.  It is up to you to develop a strong one that will thwart such attacks. The best way to do this is to understand the characteristics of a good password.  In this post, I will run through some ground rules of password security… Read more »

Identifying the Differences Between Legit and Phishing Emails

On a daily basis, organizations and individuals are subjected to attempted phishing scams.  There is a constant barrage of malicious emails, so it is understandable why so many fall victim to ransomware or other malware.  Some phishing emails are obvious frauds, but others appear authentic, and could win us over (who wouldn’t want to wire… Read more »

Three Essential Components of Taking Stock in Your Application Security 

Over the last few years, managing application security has become a targeted and paramount effort for more and more companies. Things like securing payment processing, software for managing inventory, cloud storage, and even project management applications require special attention regarding security. The security of a company’s application ecosystem means taking stock of your entire application… Read more »

Service Denied: Countering Targeted DDoS Attacks

Most people do not think about it as frequently as I do (since I work in information security), but we all know that the websites we visit – or even operate – are constantly under threat of attack.  These attacks often result in taking these sites offline – rendering it unavailable to visitors. This can… Read more »

4 Tips to Reduce Network Security Stress

Corporations around the world are experiencing record-breaking security breaches that compromise millions of consumers’ data. The affected companies have to pick up the pieces and mend broken systems and public trust. Because data security concerns continue, leadership must act quickly to ensure the safety of their employees and customers’ information. If you hold a C-level… Read more »

How to Achieve Compliance in the Cloud

A theme across many of our cloud articles is the importance of compliance. Old myths that the cloud was not tailored for compliance were a huge reason so many people stayed away from it in the early days. However, there are so many tools today for compliance tailored specifically to the cloud, and even the… Read more »

Preventing and/or Recovering from WannaCry Ransomware Attack

You don’t want to be a casualty of any ransomware threat, including WannaCry. This cyberattack hit over 300,000 computers in 150 countries. Most of the victims were in Asia, although systems in Europe and the United States were also affected. Consider yourself lucky if you did not boot up to a screen that demanded a $300… Read more »

Public Cloud: Are You Risking Security?

Cloud computing offers many benefits for businesses and consumers, however, many businesses worry that using the public cloud to store their data could open them up to security risks. Thankfully, the public cloud does not pose the same security risks today as it did in its early years. Let’s take a look at the potential… Read more »