Category: Security

Our Response to Meltdown and Spectre

To All Contegix Customers, Contegix would like to address computer vulnerabilities named Meltdown and Spectre that have been in the news recently and detail the steps we are taking to protect your environments. Computer hardware manufacturers and other core industry parties were informed of these vulnerabilities in November 2017 and have been working to address… Read more »

5 Super Spooky Facts About Shadow IT

What you don’t know about your organization’s unauthorized technology could be a major risk to your firm’s security, compliance, and IT performance. The idea of shadow IT is technically defined as “information technology projects that are managed outside of, and without the knowledge of, the IT departments.” By all accounts, shadow IT is growing at… Read more »

The DO’s and DON’Ts of Password Protection

Passwords are your first line of defense against hackers and malicious software.  It is up to you to develop a strong one that will thwart such attacks. The best way to do this is to understand the characteristics of a good password.  In this post, I will run through some ground rules of password security… Read more »

Identifying the Differences Between Legit and Phishing Emails

On a daily basis, organizations and individuals are subjected to attempted phishing scams.  There is a constant barrage of malicious emails, so it is understandable why so many fall victim to ransomware or other malware.  Some phishing emails are obvious frauds, but others appear authentic, and could win us over (who wouldn’t want to wire… Read more »

Three Essential Components of Taking Stock in Your Application Security 

Over the last few years, managing application security has become a targeted and paramount effort for more and more companies. Things like securing payment processing, software for managing inventory, cloud storage, and even project management applications require special attention regarding security. The security of a company’s application ecosystem means taking stock of your entire application… Read more »

Service Denied: Countering Targeted DDoS Attacks

Most people do not think about it as frequently as I do (since I work in information security), but we all know that the websites we visit – or even operate – are constantly under threat of attack.  These attacks often result in taking these sites offline – rendering it unavailable to visitors. This can… Read more »

4 Tips to Reduce Network Security Stress

Corporations around the world are experiencing record-breaking security breaches that compromise millions of consumers’ data. The affected companies have to pick up the pieces and mend broken systems and public trust. Because data security concerns continue, leadership must act quickly to ensure the safety of their employees and customers’ information. If you hold a C-level… Read more »

How to Achieve Compliance in the Cloud

A theme across many of our cloud articles is the importance of compliance. Old myths that the cloud was not tailored for compliance were a huge reason so many people stayed away from it in the early days. However, there are so many tools today for compliance tailored specifically to the cloud, and even the… Read more »

Preventing and/or Recovering from WannaCry Ransomware Attack

You don’t want to be a casualty of any ransomware threat, including WannaCry. This cyberattack hit over 300,000 computers in 150 countries. Most of the victims were in Asia, although systems in Europe and the United States were also affected. Consider yourself lucky if you did not boot up to a screen that demanded a $300… Read more »