dcsimg

Did British Airways Violate the GDPR?

Companies around the world have anxiously awaited who will be made an example of under the new GDPR regulations. Under GDPR, entities who violate the regulations are on the hook for stringent fines and civil lawsuits. … [Read more...]

Monitor Dark Web Traffic with WhatsUp Gold 2018

Monitoring traffic on the dark web is the kind of thing that IT administrators worry about, but they can't do anything about. Now IT can pinpoint who and what is accessing the dark web from corporate networks with WhatsUp Gold 2018.  … [Read more...]

DEF CON 26 Highlights US Electronic Voting Machines Security Flaws

DEF CON 26 is over, but more questions than answers remain. After all we've seen, are electronic voting machines really the best and safest way to cast our votes? … [Read more...]

Defrag This – How to Prepare for a HIPAA Audit

Nobody likes to be audited. It’s invasive and unpleasant, but being prepared for it can make the process much easier. … [Read more...]

Why Are File Transfers Considered High Risk?

External file transfers of digital assets are risky for everyone—no matter if you’re a healthcare organization, financial institution, insurance company, retail store, manufacturer or in education. … [Read more...]

Defrag This – California’s New Consumer Privacy Act

In this episode of Defrag This, we discuss the repercussions the new California Consumer Privacy Act will have on US data privacy laws and how and if it relates to the GDPR. … [Read more...]

Defrag This – 3 Steps for Turning Cybersecurity Fears into an Action Plan

If you’re afraid of having a cybersecurity professional take your money without delivering on their outlandish claims, there are some steps you can take to weed out the snake oil salesmen from the real cybersecurity experts. … [Read more...]

Microsoft Acquires GitHub – Is This A Good Thing?

GitHub is being acquired by Microsoft. Is it time for developers to panic and export their repositories to another product or can Microsoft be trusted? … [Read more...]

Defrag This – What’s the Necessary  Experience For Entry Level Cyber Security?

So you decided that they want to pursue a career in information security. Of course, the first thought may be to go to school or study to pass certification exams such as Security+, CISSP, or CEH. However, there is an increasing argument that you can’t just walk right into a security job out of school or just by getting a certification. … [Read more...]

What is an FTP Sprawl?

To this day, FTP (file transfer protocol) and the more secure SFTP (secure file transfer protocol) are still the most used standard to move files over the Web. It’s cost effective, quick and easy to deploy, and if used correctly in a regulated industry it keeps users from using non-compliant data transfer tools like Google Drive and DropBox. However, do those benefits outweigh the risks? … [Read more...]