Category: Security

DNS Services: What’s a safe bet for finance?

After your company has decided that a managed Domain Name System (DNS) solution is the right move, there are some important next steps you should take. Surfing the web, you never really think about your DNS. If you type in a website address and immediately have access to it, all is well. Once considered secure, standard… Read more »

More Banking, Less Hacking: Protecting your Financial Data

John Dillinger. Bonnie and Clyde. Butch Cassidy and the Sundance Kid … The most notorious bank robbers are long gone – as are the days when you could actually put a name and face to the person committing the heist. However, robberies are not the only concern for today’s financial institutions or their clients. The… Read more »

Top 5 Ways to Reduce Atlassian Security Stress

Stress is a common part of having a job in IT, but some stress can be good.  It keeps you on your toes, looking for what might be an issue, and keeps you from being completely surprised by unexpected risks. However, security stress can become paralyzing, and inhibit your ability to make decisions because you’re… Read more »

Does Covering your Webcam Make You Paranoid or Proactive?

It glares at you, often for several hours at a time. You travel with it. You may never use it, but always have it. Webcams are now a staple for our laptops, tablets, and even our phones. As with every aspect of our technologically-inclined society, webcams are not as unassuming as they seem. You’re NOT… Read more »

5 Biggest Enterprise Cloud Trends of 2018

While the cloud and its role in enterprise technology has evolved significantly in recent years, Forrester analysts predict 2018 will be the year tech leadership works towards locking-in cloud computing for the future. Analysis published in Forbes states that enterprises are no longer questioning whether the cloud is the best choice, “they now scramble to… Read more »

Our Response to Meltdown and Spectre

To All Contegix Customers, Contegix would like to address computer vulnerabilities named Meltdown and Spectre that have been in the news recently and detail the steps we are taking to protect your environments. Computer hardware manufacturers and other core industry parties were informed of these vulnerabilities in November 2017 and have been working to address… Read more »

5 Super Spooky Facts About Shadow IT

What you don’t know about your organization’s unauthorized technology could be a major risk to your firm’s security, compliance, and IT performance. The idea of shadow IT is technically defined as “information technology projects that are managed outside of, and without the knowledge of, the IT departments.” By all accounts, shadow IT is growing at… Read more »

The DO’s and DON’Ts of Password Protection

Passwords are your first line of defense against hackers and malicious software.  It is up to you to develop a strong one that will thwart such attacks. The best way to do this is to understand the characteristics of a good password.  In this post, I will run through some ground rules of password security… Read more »

Identifying the Differences Between Legit and Phishing Emails

On a daily basis, organizations and individuals are subjected to attempted phishing scams.  There is a constant barrage of malicious emails, so it is understandable why so many fall victim to ransomware or other malware.  Some phishing emails are obvious frauds, but others appear authentic, and could win us over (who wouldn’t want to wire… Read more »

Three Essential Components of Taking Stock in Your Application Security 

Over the last few years, managing application security has become a targeted and paramount effort for more and more companies. Things like securing payment processing, software for managing inventory, cloud storage, and even project management applications require special attention regarding security. The security of a company’s application ecosystem means taking stock of your entire application… Read more »