<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">
Skip to main content

Blog

The Key to Successful SIEM

In response to increased compliance concerns and the need to protect against security breaches, more companies are implementing SIEM technology to more easily collect, correlate and analyze data and security alerts from a central location. But once a SIEM is in place, how ...

Financial Regulators Crack Down on Cybersecurity

With the ever increasing number of financially oriented businesses, there are a lot more assets that are of value to criminals—in addition to money. This includes retail customers’ personal data as well as competitive information. It’s all valuable. And it’s a big reason ...

The One Thing All Secure Networks Should Have in Common

The days of dividing your firewall up into three primary zones—inside, outside, and DMZ—have come to an end. Security standards such as PCI-DSS, HIPAA, NIST, and a host of others, all suggest the use of segmentation in order to protect critical systems.

5 Smart Reasons To Consider a Managed Security Service Provider

You've seen it in the news: cyberattacks on big, billion dollar companies expose millions of customers’ personal information, and that draws a lot of media attention. Attacks on smaller companies tend to fall under the radar, leading many to think they’re "too small" to ...

Drinking from the SANS Fire Hose: The Finest Cybersecurity Instruction

The SANS Institute is a cooperative research and education organization that reaches more than 165,000 security professionals around the world. Their programs undergo constant scrutiny and revision to ensure that the content is both on point and represents the state of the ...

Privileged Accounts: Catch-22 for Network Security

Privileged accounts represent one of the largest vulnerabilities an organization faces today in network security. It doesn’t matter if the accounts are compromised by an external attacker or a malicious insider. If privileged accounts are in the hands of an adversary it is ...

IRS: Hacked to the Third Power

IRS Breach Update In May 2015 the IRS announced that they had been breached and that only about 100,000 people had been affected. A couple of months later, they said “wait…wait…Maybe that number was higher…about 334,000.” Now, here we are several months later and the IRS is ...

IT Professionals: Quit Buying Bad Customer Service

Think about the last time you went to a restaurant and experienced truly terrible service. Whether you waited an hour for your food, they messed up your order, your server needed an attitude adjustment, or all of the above, how likely is it that you will return anytime in ...

Ransomware Costs Hollywood Presbyterian Medical Center $3 Million

Infogressive’s Jeff Murphy provides feedback from SC Magazine’s article “Ransomware goes to Hollywood medical centre.” For Hollywood Presbyterian Medical Center to have paid out over three million dollars in ransomware and suffered a week of down time indicates a less than ...

Prepare for the Hunt: Five Practical Tips to Make Log Analysis Less Miserable

Log analysis. It’s a thing. First reactions are probably going to be “Yuck,” “Make the new guy do it,” “Insert expletive here,” or the more common “Why? What broke now?”

Less than 90 Seconds: How Long It Takes for a Phishing Email to Be Opened on Your Company’s Network

One minute and 22 seconds.

A Beginner’s Guide to Email Encryption

Online security has been on the top of many people’s minds lately, with the Sony email leak and other security breaches leaving us wondering what we can do to protect our personal information that we share online. We’ve already shared four things you can to do protect ...

4 Ways to Protect Yourself from Identity Theft

Security breaches have become all too commonplace. From the recently disclosed Anthem, Inc. hack that has affected up to 80 million of the health insurers’ customers to the massive breach at Target in 2013, where 70 million customers saw their personal data exposed, we’re ...

Microsoft Outlook Voicemail Phishing Scam Fooling Users into Downloading Malware

Microsoft Outlook users should keep their eyes peeled for a phishing attempt targeting business users of the popular mail client. Though this phishing attempt has been making the rounds for a couple of years, it hasn’t shown signs of slowing down.

Improve Your Online Security with Two-Factor Authentication

Several high-profile instances of hacked accounts earlier this year – most notably the AP, CBS, and Burger King Twitter accounts – have shed light on a real problem for news organizations, corporations, and consumers: hackers can access sensitive accounts with relative ease.