Tag Archives: cyber security

Case Study: CPI Solutions and StorageCraft Conquer Cryptolocker

CPI-Solutions-Case-Study-Slider

Conquering Cryptolocker? No big deal. Read how CPI Solutions does it with StorageCraft.

Topics: , ,

Analyzing North Korea’s Elite Hacker Squad and the U.S. Cyber Warfare Strategy

US security and north korean hackers

I’ve heard a few people dismiss the North Korean dilemma as a non-issue, but you may feel otherwise after getting familiar with the hacking culture in the Democratic People’s Republic of Korea.

Topics: ,

5 IT Security Threats That Will Wreak Havoc in 2015

online security

If you work in IT, operate a business online, or simply spend a lot of time at the computer, you’ll want to stay on top of the trends and threats stirring up chaos on the security front.

Topics: , ,

Who are the Most Prominent Hackers and What Motivates Them?

hackers and their motivation

Cyber attacks happen all the time, but who are some of the most prominent hackers around and why do they do it?

Topics: ,

When Do You Reasonably Need to Use Data Encryption?

which encryption to use

Encryption has been around for many years and comes in many forms. Should you be looking to encrypt every single device you own? What about your laptop or desktop PC? Does it make sense to encrypt your phone or server, and are there any trade-offs for that added security?

Topics: , ,

Top 7 Worst Data Disasters of 2014

data disasters 2014

There are some disturbing trends on the IT security front. According to IDTheftCenter.org, which gets updated daily, 2014 is on pace to surpass 2013 in total number of reported data breaches, possibly by a significant margin. Here’s a look at some of the absolute worst data disasters of the year and how they contributed.

Topics: , ,

Testing Employees’ Cyber Security Knowledge

cyber-security knowledge

How do IT admins test employees to see if they are being safe computer users? Here are a few ideas.

Topics: , ,

Radio Frequency Attacks and the Evolution of Hacking

radio-frequency hacking

Armed with a piece of malware known as AirHopper, hackers can attack those isolated machines over radio frequencies. Here’s what you can do to protect vulnerable systems.

Topics: , ,

Why You Need a Data Breach Response Plan and How to Make One

why you need a data breach response plan

With any luck, you might never need to use your response plan at all, but that doesn’t mean you don’t need one.

Topics: , , ,

What IT Risks are You Overlooking?

what IT Risks are you overlooking?

There’s a lot to consider when you are talking about safety and security: Failures, heat, human error, power, etc., but what are some things that are commonly overlooked?

Topics: , , ,

Is Homomorphic Encryption the Future of Enterprise Data Security?

homomorphic cloud encryption

Encryption has been fairly effective at keeping hackers out and providing a peace of mind for the people and organizations who adopt it. To eliminate the hassle associated with the decryption process, IBM has invested in homomorphic encryption, a cutting edge cryptography concept that could have revolutionary implications.

Topics: , , ,

Top 2 Best Practices for Employee Monitoring

employee monitoring

In many places, it’s completely legal to monitor employees, but that doesn’t mean you should do it with out thinking about a few things.

Topics: , ,

3 Preventive Security Actions That Don’t Require Employee Monitoring

ensuring security without employee monitoring

Rather than monitoring employees, you’re much better off using layered security solutions to prevent such vulnerabilities as malware, loss of IP (Intellectual Property) and other confidential information, and possible litigation resulting from illegal activity or non-compliance.

Topics: , ,

Cyber Insurance: What Is It and Do You Need It For Your Business?

cyber insurance

Cyber insurance is an outside-the-box concept that can help better manage the risks, and the huge financial losses that follow.

Topics: , ,

If Corporations Won’t Protect Consumer Privacy Can MSPs?

corporations and privacy

Corporations collect personal data for many reasons, but MSPs don’t have to sit idly by while consumer privacy dissolves.

Topics: , ,

Global Data Breaches and a Look at Cyber Crime by Country

world of cyber crime

You’ve probably read about China’s hacking and cyber-crime tendencies, but there are specialized attacks coming from countries across the world. Here’s who is doing what.

Topics: , ,

Do You Need Risk-Based Authentication? (RBA)

risk-based authentication

RBA takes various factors into account such as a user’s location, login time, device, and IP address to determine a risk score. If the risk score is too high, access to the network will be denied. If you’re worried about security, it might be time to implement RBA.

Topics: , ,

Network Virtualization: Security Benefits, Risks and Best Practices 

virtualization and security

If network intrusion and data breaches are topics that keep you up at night, security may be the fuel behind your virtualization aspirations.

Topics: , , ,

Somebody is Watching You: Understanding and Keeping your Privacy

information security

We spoke with some experts in the information security field about what companies are doing– or should be doing– to keep data completely secure.

Topics: , ,

Encryption in Messaging Apps: How Secure Are Your Communications?

encrypted messaging apps

Anti-virus software and firewalls are common security technologies we’ve been taught to prioritize. Encryption deserves the same respect.

Topics: , , ,

Password Management Sucks But it Doesn’t Have To

password management

There are a lot of tips and tricks to managing a bevy of secure passwords for the dozens of sites we need to login to. Some are best avoided, some are downright stupid, and some will save you a lot of headaches. Let’s look at the pros and cons of a few different options.

Topics: , ,

3 Tips for Responding to a Data Breach

how to respond to data breach

Unfortunately, no data protection plan is 100% foolproof, and that’s why you need to know exactly how to respond to a data breach if it happens to your business.

Topics: , , ,

2 Key Challenges To Fighting ‘Dark Nets’ and Onion Networks

dark nets and onion routing

My last post gave an overview of the problems law enforcement agencies face in investigating and apprehending criminals as the latter increasingly make use of encrypted communications and so-called “Dark Nets.” A great deal of tension exists between law enforcement’s need to solve crimes and the legitimate worry of citizens losing civil liberties in the process.

Topics: , ,

An In-Depth Look at Managed Physical Security and Opportunities for MSPs

managed security

The idea of managed security is nothing new, but has traditionally been focused more on cyber threats. Now both customers and MSPs are starting to realize the value of managing security on the physical side of the fence.

Topics: , , ,

Video Surveillance Technology for MSPs: Key Selling Points and Considerations

surveillance and MSPs

Managed service providers looking for lucrative products or services to add their portfolio may need to look no further than video surveillance.

Topics: , , , , ,