High-profile, newsworthy cyber breaches may have you believe that only big corporations like Target, Facebook, and Equifax are where cyber criminals focus their efforts. However, it continues to be proven that small and mid-sized organizations are being targeted frequently, despite the belief that a smaller organization has nothing that would be valuable to a criminal.
Leaving your remote desktop protocol (port 3389) servers open to the internet has been known to be a cybersecurity “bad idea” for years, but the Bluekeep vulnerability, as well as the more recent Seven Monkeys batch of disclosed vulnerabilities, have made this vital to your business’s survival.
Traditional antivirus simply isn’t enough to fight the advanced, targeted attacks being deployed today.
How do you fight back? What solutions do you need to prevent the dramatic loss that can rampage through your company?
It’s time to fight back with the next generation of antivirus technology.
The fact is, there’s a right way and wrong way to deploy a firewall in a network. Positioning your firewall correctly could make all the difference if a malicious actor were to obtain access to a workstation in your environment.
Follow along in this week’s Whiteboard Wednesday video as our CEO, Justin Kallhoff, discusses the differences between a flat and segmented network.
People familiar with Hypertext Transfer Protocol Security (HTTPS) know it protects online activities and communications by applying Secure Sockets Layer (SSL) encryption to web traffic. This is a benefit to organizations that need to shield private data from exposure. And what organization doesn’t?
It seems that our news feeds are constantly flooded with the headlines of the latest cyber attack. Wishing it away, or hoping that our news filters are malfunctioning, is just not possible. Sadly, it is due to the fact that these crimes are happening more frequently than ever before.
The days of dividing your firewall up into three primary zones—inside, outside, and DMZ—have come to an end. Security standards such as PCI-DSS, HIPAA, NIST, and a host of others, all suggest the use of segmentation in order to protect critical systems.
Infogressive’s Jeff Murphy provides feedback from SC Magazine’s article “Ransomware goes to Hollywood medical centre.”
For Hollywood Presbyterian Medical Center to have paid out over three million dollars in ransomware and suffered a week of down time indicates a less than stellar cyber security posture.
Log analysis. It’s a thing. First reactions are probably going to be “Yuck,” “Make the new guy do it,” “Insert expletive here,” or the more common “Why? What broke now?”