dcsimg

Taking the Fear Out of Backup and Recovery

There is an old combat adage, often associated with the U.S. Civil War, that describes warfare as "long periods of boredom punctuated by moments of sheer terror.” While, thankfully, I have no direct combat experience, I can see parallels (on a much smaller scale) with the world of backup.  Read More … [Read more...]

5 Questions to Ask Legal About Vulnerability Disclosure

In part two of our series exploring the relationship between law and security, we’ll look at the key questions cybersecurity should ask legal when a company learns about a vulnerability in a product they produce or use.  Vulnerabilities reside within somewhat of a legal and ethical gray zone when it comes to disclosure and response. There are responsible disclosure practices, but no laws that … [Read more...]

December 2019 – Microsoft Patch Tuesday

December is here already and ‘tis the season to be jolly – but not so jolly that we forget to stay vigilant and on guard against the attackers who want to send us the wrong kind of gifts. Unfortunately those who look for software vulnerabilities to exploit rarely take the holiday off, so it’s still […] … [Read more...]

Find Out Which SEO Keywords Your Competitors are Using

<p>As a Managed Services Provider (MSP) knowing what Search Engine Optimization (SEO) keywords your company should target for your website and how to outperform your competitors in this area can seem like a daunting task.</p> Read More … [Read more...]

Nine steps to successful ISO 27001 implementation

It may be something of a cliché but, for information security management system (ISMS) projects, it is certainly true to say that ‘well begun is half-way done’. The person charged with leading an ISO/IEC 27001:2013 ISMS project has to reduce something that looks potentially complex, difficult and expensive in terms of time and resources, to something that everyone believes can be achieved in the … [Read more...]

Using Virtualization to Support Hardware Flexibility

Depending on your computer hardware strategy, your IT environment’s complexity—and the tools needed to handle it—may vary considerably. As a rule, company-owned devices come with the lowest complexity levels and the best control possible for devices and related tools. Bring-your-own-device (BYOD) is the exact opposite, creating the largest amount of complexity due to a potentially infinite … [Read more...]

A Data Breach Detection and Prevention Solution – Lepide Data Security Platform

If your company stores personally identifiable information, or sensitive data of any kind, you’re going to need to have robust data security to ensure you are protected from insider threats, malware, rogue administrators and other data breaches. IT teams must implement third-party data breach detection and prevention solutions to detect, prevent and respond to potential security threats. Achieving … [Read more...]

Use Promodag Reports in 64-bit mode

We deliver two versions of the Promodag Reports executable: Repex.exe (32-bit version by default) and Repex64.exe (64-bit version). The possibility of... Continue reading … [Read more...]

Microsoft’s December 2019 Patch Tuesday Includes Fix for Zero Day Exploited in the Wild (CVE-2019-1458)

Microsoft closes out 2019 by patching 36 CVEs, including one flaw that was exploited in the wild as a zero-day. Microsoft sent administrators around the world an early holiday gift with a lighter-than-usual Patch Tuesday. The December 2019 Patch Tuesday contains updates for 36 CVEs, seven of which are rated as critical. This month’s updates include patches for Microsoft Windows, Microsoft Office, … [Read more...]

Hundreds of counterfeit online shoe stores injected with credit card skimmer

There’s a well-worn saying in security: “If it’s too good to be true, then it probably isn’t.” This can easily be applied to the myriad of online stores that sell counterfeit goods—and now attract secondary fraud in the form of a credit card skimmer. Allured by great deals on brand names, many people end up buying products on dubious websites only to find out that … [Read more...]