Category: Security

Identifying the Differences Between Legit and Phishing Emails

On a daily basis, organizations and individuals are subjected to attempted phishing scams.  There is a constant barrage of malicious emails, so it is understandable why so many fall victim to ransomware or other malware.  Some phishing emails are obvious frauds, but others appear authentic, and could win us over (who wouldn’t want to wire… Read more »

Three Essential Components of Taking Stock in Your Application Security 

Over the last few years, managing application security has become a targeted and paramount effort for more and more companies. Things like securing payment processing, software for managing inventory, cloud storage, and even project management applications require special attention regarding security. The security of a company’s application ecosystem means taking stock of your entire application… Read more »

Service Denied: Countering Targeted DDoS Attacks

Most people do not think about it as frequently as I do (since I work in information security), but we all know that the websites we visit – or even operate – are constantly under threat of attack.  These attacks often result in taking these sites offline – rendering it unavailable to visitors. This can… Read more »

4 Tips to Reduce Network Security Stress

Corporations around the world are experiencing record-breaking security breaches that compromise millions of consumers’ data. The affected companies have to pick up the pieces and mend broken systems and public trust. Because data security concerns continue, leadership must act quickly to ensure the safety of their employees and customers’ information. If you hold a C-level… Read more »

How to Achieve Compliance in the Cloud

A theme across many of our cloud articles is the importance of compliance. Old myths that the cloud was not tailored for compliance were a huge reason so many people stayed away from it in the early days. However, there are so many tools today for compliance tailored specifically to the cloud, and even the… Read more »

Preventing and/or Recovering from WannaCry Ransomware Attack

You don’t want to be a casualty of any ransomware threat, including WannaCry. This cyberattack hit over 300,000 computers in 150 countries. Most of the victims were in Asia, although systems in Europe and the United States were also affected. Consider yourself lucky if you did not boot up to a screen that demanded a $300… Read more »

Public Cloud: Are You Risking Security?

Cloud computing offers many benefits for businesses and consumers, however, many businesses worry that using the public cloud to store their data could open them up to security risks. Thankfully, the public cloud does not pose the same security risks today as it did in its early years. Let’s take a look at the potential… Read more »

Hack Prevention and Best Practices

Being hacked has serious implications. The effects are wide-ranging and can cost you a lot of money. The best way to mitigate the impact is by preventing the hack from happening in the first place. Reducing the available attack surface is a great way to accomplish this. Here are a few actions you can take… Read more »

How to Handle a Data Breach

When a breach happens, how you proceed and the actions you take will help mitigate the impact to your bottom line. The type of information stolen generally dictates the seriousness of the entire situation. Back everything up fresh. Treat it like a police crime scene and preserve the evidence. Logfiles, configuration files, and affected data.… Read more »