dcsimg

3 tips for maintaining GDPR compliance

For the past year or so, cyber security experts have been asking, with increasing concern, whether you’ve complied with the EU General Data Protection Regulation (GDPR) yet. Hopefully you have, but it’s important to remember that compliance isn’t a fixed state. It’s not a point you get to where you can stop and think “mission accomplished”. It’s something that needs to be achieved and maintained – … [Read more...]

5 Steps for Developing a Successful Data Access Governance (DAG) Program

Unstructured data (which includes emails, PDFs, documents, presentations, intellectual property and any other data that may exist beyond the scope of your application or database) is fast becoming a prime target for cyber-criminals. To ensure that your unstructured data is sufficiently protected, you will need a Data Access Governance (DAG) program. A common issue, however, is that … [Read more...]

How to Protect Your Customers Against the Rising Tide of Malvertising

Cybercriminals are always looking for new ways to generate illicit income, but that doesn’t mean they are ignoring old favorites—like malvertising. What is malvertising? The very fact that advertisements are so commonplace has led to them becoming a familiar part of the online landscape. Most often considered either an unwanted annoyance or necessary evil, online ads can actually be something … [Read more...]

Is Your Team Ready to Go to Market?

Once you’ve established which managed services programs you’re providing, you need to ensure you and your team are actually ready to SELL them successfully. In her MSP Institute Business webinar, Stefanie Hammond, sr. channel sales specialist at SolarWinds MSP, provides a checklist of items and activities that you, as a business owner, need to review to ensure you’re ready to go to market. Read … [Read more...]

Abacus Group secures privileged access for alternative investment clients with Thycotic Secret Server

WASHINGTON, D.C., June 14, 2018 — Thycotic, a provider of privileged account management (PAM) solutions for more than 7,500 organizations worldwide, announced that Abacus Group, a leading managed service provider of hosted IT solutions for alternative investment firms has expanded and customized its use of Secret Server for more than 350 clients to date. Managing up to 3,000 passwords for … [Read more...]

How To Use Vagrant Networking

 In this article, I will discuss some of the ways to configure virtual machines using Vagrant networking. … [Read more...]

Parallels Remote Application Server and Ivanti: Better Together

Customize User Experience, Improve Application Control, and Performance Virtual Desktop and Application Delivery  Virtual desktops and applications can help many businesses and organizations of any size improve data security, simplify application management, and enable secure remote connectivity from any device, anywhere, increasing user’s productivity. Some of the common concerns … [Read more...]

June 2018 – Microsoft Patch Tuesday

Here in Texas, although summer doesn’t “officially” arrive until later in the month, it certainly feels like summertime with temperatures in the 90s every day. We are “walking in sunshine” here on the lake. As they say, when you’re hot,  you’re hot. And of course, security never ceases to be a hot topic. June headlines include reports that three fourths of U.S. federal agencies are facing … [Read more...]

Should You Still Prioritize Exploit Kit Vulnerabilities?

One of the greatest challenges that enterprises face is prioritizing vulnerabilities for remediation. Trying to determine which vulnerabilities pose a true imminent risk deserving of immediate attention can feel like a game of Whac-A-Mole due to the sheer volume of critical vulnerabilities. An analysis of CVE data by Tenable Reseach’s Lucas Tamagna-Darr shows the number of disclosed … [Read more...]

Apple Code-Signing Flaw: Developers Beware

Okta’s Research and Exploitation team released details on June 12 about an issue with third-party code-signing validation using Apple’s APIs. The flaw, which dates back to 2005, makes it possible for attackers to make malicious code appear to be signed by Apple when, in fact, it is not. Multiple third-party applications are affected – particularly those which offer “whitelisting services” – … [Read more...]