dcsimg

Podcast: Have You Met? David Perkins, Level 8 Solutions

Level 8 Solutions called into the Defrag This - Have You Met? podcast studio to provide some insight into how they are implementing IT solutions in the UK. … [Read more...]

Consumers have few legal options for protecting privacy

There are no promises in the words, “We care about user privacy.” Yet, these words appear on privacy policy after privacy policy, serving as disingenuous banners to hide potentially invasive corporate practices, including clandestine data collection, sharing, and selling. This is no accident. It is a strategy. In the US, companies that break their own privacy policies can—and do—face … [Read more...]

Top 5 Types of Mobile Device Breaches

Mobile devices are one of the weakest links in cyber security for businesses, yet very little is being done to mitigate the risks around these top 5 types of mobile device breaches. … [Read more...]

Steps to Troubleshooting DNS Issues

<p>If a user’s browser window comes up blank with a message that the “server DNS address cannot be found,” this signals a DNS error that needs your instant attention. The inability to access the internet or particular sites can have an immediate negative business impact. DNS troubleshooting can be a headache for managed services providers (MSPs), but it’s crucial that they understand the ins … [Read more...]

KuppingerCole weighs in on Privileged Access Management vendors in new report

Analyst firm KuppingerCole just released a new report— Leadership Compass March 2019 vendor evaluation for Privileged Access Management (PAM).  Over more than 60 pages, KuppingerCole analyst Anmol Singh provides a thorough review of 20 PAM vendors in a rapidly growing PAM market. He emphasizes, “PAM has emerged as one of the most crucial IAM technologies that has a direct relevance and … [Read more...]

Metrics and Maturity: Benchmarking Your Cyber Exposure Over Time

In part four of our six-part blog series, we explore the challenges facing organizations as they try to accurately answer the question “How are we reducing our exposure over time.” Here’s what you need to know. When you’re tasked with addressing thousands of vulnerabilities per year, it’s hard to imagine having the luxury to pause and assess your current performance against prior periods. But the … [Read more...]

Why CISOs are Suffering from Increasing Levels of Stress

When it comes to the world of cyber-security, it’s practically impossible to predict what is around the corner, and it’s no surprise that CISOs are struggling to keep their heads above the water. They are required to deal with a wide-range of attack vectors including APTs, Phishing, DDoS, Ransomware, Cryptojacking, Formjacking, “brute force” password attacks, and more. To … [Read more...]

Citrix Machine Creation Services (MCS): What Is It?

What Is Citrix Machine Creation Services (MCS)?  Citrix MCS is one of the many components of the Citrix Virtual Apps and Desktops infrastructure platform, allowing IT administrators to design and deliver virtual desktops.  How Citrix MCS Works  Using application programming interfaces (APIs), Citrix MCS configures, starts, stops, and deletes virtual machines (VMs) through the underlying hypervisor … [Read more...]

Of hoodies and headphones: a spotlight on risks surrounding audio output devices

More than a decade ago, cardiologists from the Beth Israel Medical Center in Boston presented their findings at the American Heart Association (AHA) Scientific Sessions 2008 about MP3 headphones causing disruptions with heart devices—such as the pacemaker and the implantable cardioverter defibrillator (ICD)—when the headphones were placed on their chests, directly over their devices’ … [Read more...]

A week in security (April 15 – 21)

Last week, Malwarebytes Labs revealed multiple giveaway online scam campaigns banking on the popularity (and generosity) of Ellen DeGeneres, weighed in on the hack that compromised legacy Microsoft email service accounts like Hotmail and MSN, explained what “like-farming” means and how to spot it on social media, and spotlighted on uncharacteristic executable file formats one of our researchers … [Read more...]