dcsimg

A Security Guide to Preparing for the Future

<p>We don’t need to tell you how fast the threat landscape is evolving; you’re in the middle of it. Today, being a good guy is getting really hard. So much noise, so many vendors, so many threats—it’s hard to keep up.</p> <p>As good guys we need to keep making it harder for the bad guys to achieve their goals. We need to protect our customers to an appropriate level based on the … [Read more...]

GDPR One Year On: The Data Privacy Wormhole

Today marks the first anniversary of the launch of the General Data Protection Regulation (GDPR). For many, the past 12 months have been a steep learning curve from a data privacy perspective.  Read More … [Read more...]

Evaluating Risk and Response for Your Customers

Why are we talking about risk, and not about security?  People consider security a binary—I am either secure or not secure. Even though we are in the “security” business, we can never ensure 100% security, so this is a terrible position to start from. Risk, on the other hand, although constantly changing, is a measurable “nonbinary” thing that can be addressed through a series of questions, … [Read more...]

What Is Advanced Endpoint Security and Why Is It So Important?

Right now, potential intruders are probably rattling your network’s digital doors, looking for a way in. Endpoint devices are a common weak spot that allow these attacks access to your infrastructure. Advanced endpoint security can help seal off these attack points, providing valuable protection for your company. Here’s how it works, and why you should invest in it. Read More … [Read more...]

Et Tu, Admin? A New Ransomware Attack Using Admin Accounts

A disturbing new trend in cyberattacks has started to become prevalent. Recently, a beverage manufacturer was hit by a ransomware virus; however, what’s new here is it was remotely installed using an administrator account. While ransomware has traditionally been delivered by email, this could signal a new attack vector we need to protect against.  Read More … [Read more...]

The Ins and Outs of Security Awareness Training

One of your customers’ employees logs into their computer. They get an email from someone claiming to be their IT service provider, saying they must reset their password immediately (even though there wasn’t any warning beforehand). They click a link without checking the destination URL, go to a phishing site, and enter the credentials for their email. The criminal now has access to their email … [Read more...]

The Hidden Effects of a Data Breach: What We Can Learn from The Past

I really think we need to look at history as an indicator of the future.   It’s the worst call a C-suite executive can get: A panicked IT technician tells you that your records have been compromised. Customer information may be out in the wild, and there’s nothing you can do to get it back. You know that there will be financial implications, but the dangers are unlikely to end … [Read more...]

IT Risk Management Process: Risk vs. Threat

Every day seems to bring another story of a cybersecurity attack, stemming from a growing range of IT security threats. Everything from new malware strains to new, active phishing attacks. Managing all these challenges to security is daunting for even the most security-conscious organizations. It’s hard to keep up with these IT security threats, especially when there are only so many information … [Read more...]

Why You Should Care About Advanced Threat Protection

In cyberspace, attackers are honing their skills and using more advanced techniques to silently compromise systems. Advanced threat protection systems offer targets a way to defend themselves against determined intruders. Here’s how. To understand what advanced threat protection is and why it’s so important, we have to understand advanced persistent threats (APTs). These are attacks in which an … [Read more...]

Cryptomining Attacks: The Silent Killer? 

Toward the end of December 2017, we saw a sharp decline in the number of ransomware variants being produced by cybercriminals. At the same time there was a massive spike in cryptomining attacks.  Read More … [Read more...]