dcsimg

5 Ways Employees Move Data and Why It’s Detrimental to Data Security

Whether it's your Marketing, Sales, or Finance team, employees are always trying to get work done as quickly as possible. … [Read more...]

January 2020 – Microsoft Patch Tuesday

The new year is here, and it traditionally brings with it the opportunity to start over, to clear the slate and do things differently. If you’re an IT pro and you’ve been lax in applying security updates in 2019, this is the perfect time to make a New Year’s resolution to stay on top of […] … [Read more...]

Install Free Let’s Encrypt SSL SAN Certificate for Exchange 2019

When an Exchange organization is made available for external and internal access, the proper SSL certificate must be installed on the server.  … [Read more...]

Isolation Helps Secure Virtual Machines

Virtualization plays a major role in computing in general and is gaining relevance in desktop computing. When in use as test environments or virtualized desktop systems, virtual machines (VMs) may seem to have quite low security requirements at first sight. Acting as so-called sandboxes, VMs are easy to set up and delete again and only present a limited hazard for their host … [Read more...]

Security Considerations for Data in the Cloud

On-premise data centers vs. the cloud: which environment offers stronger data security? … [Read more...]

Third Party Patch Roundup – December 2019

December is a magical month, for children and adults alike. It’s the beginning of winter, when – in many places at least (not usually here in north central Texas) blankets of soft white snow cover the landscape and ordinary houses and trees take on a pristine, other-worldly look. It’s the time for holiday celebrations that […] … [Read more...]

2019 Cybersecurity Incidents: What Did We Learn?

Should AULD attack types be forgot and never brought to mind? As I sit writing this article on New Year’s Eve, that’s the song that’s running through my mind. It’s inevitable that my thoughts are centered on what this past year brought us in terms of device, network, and cloud security. That includes both the […] … [Read more...]

6 Ways Iran Could Retaliate Using Cyber Attacks

Over the past day, we've heard about the recent escalations between the US and Iran. Iran will retaliate with one of their favorite weapons, cyber attacks. … [Read more...]

6 Ways Bad Actors Could Retaliate Using Cyber Attacks

Over the past day, we've heard about the recent escalations between two particular countries. Nation-states usually will retaliate with one of their favorite weapons, cyber attacks. … [Read more...]

Podcast: Using Automation and Threat Modeling to Protect Your Network

Proper security hygiene is impossible without some form of automation. Too many hours are wasted due to manual effort when security and IT teams could be spending time on more critical issues. … [Read more...]