Not sure which way to go? I have the answers…

Cloud Security – an oxymoron or matter of policy?

Cloud Security – an oxymoron or matter of policy?

We all know what an oxymoron is, adopted phrases that seem to describe something but use two diametrically opposed words to convey them, e.g., A Fine Mess, A Little Big, A New Classic, Accurate Estimate, Almost Ready, Awfully Good, Auto Pilot, About the Same, Anxious Patient, and so one. So we have a new one, Cloud Security, or is this really an oxymoron? It...

Security Best Practices – 10 of the best things you can do

Security Best Practices – 10 of the best things you can do

Corporate security consumes a huge chunk of time, money, and human resources. It’s no wonder that companies like Symantec exist. Symantec produces some of the security industry’s best software, but its contribution doesn’t stop there. Symantec also produces an annual Internet Security Threat Report. In these reports, Symantec highlights...

Security will be the Top Issue of 2013

Security will be the Top Issue of 2013

Information security continues to grow more complex, and 2013 will be no exception.  Security personnel must evaluate their current security measures and develop action plans to tighten defenses and prepare them for the coming threats, or become victim to the payload. Security officers educating those who are less aware of security issues around emerging...

Pay Up….You’ve been Hacked!

Pay Up….You’ve been Hacked!

It nearly sounds as if it’s out of a movie. Picture it: You boot up your computer, only to discover that all your files have disappeared — and a stranger is holding them hostage until you fork over some dough. It’s one of the latest threats to your network and unlike many cyber threats, the culprits are literally taunting you over what’s been done....

Is it April Fool’s Day? ….Nope, that’s malware attacking your printer

Is it April Fool’s Day? ….Nope, that’s malware attacking your printer

We all run into standard printer frustrations. The inevitable ‘paper jam’ or ‘ink too low,’ when it’s clear there is plenty enough ink left to print your one page document. Let’s be honest, it wouldn’t be a Monday without it. But lately, it’s been security analysts who have been called to the printer rescue instead of the intern. Security analysts everywhere...

Exploiting VoIP for Toll Fraud – Don’t get slapped with someone else’s long distance calls!

Exploiting VoIP for Toll Fraud – Don’t get slapped with someone else’s long distance calls!

We’ve all been there…a quick glance at the monthly phone bill, followed by a second and then the long stare and a raising of the eye brows. ‘Did I really talk for that long?’ ‘He was in Singapore on that call!?! A majority of the time, it’s a slight increase in the monthly bill that draws initial skepticism. But, when the monthly phone bill jumps up to the same...

Banking Trojans – You won’t spot them until it’s too late.

Banking Trojans – You won’t spot them until it’s too late.

There’s a race occurring daily and it’s as competitive as any competition imaginable. What’s at stake you ask? Your bank account… Cybercriminals are hard at work, chipping away at any form of protection you or your bank can throw at them. The problem? The bad guys get as many attempts as they want and the bank only has to fail once before millions can be lost...

Hark! Who goes there? Are your computers secure at the most basic level?

Hark! Who goes there?  Are your computers secure at the most basic level?

Hark! Who goes there?  Are your computers secure at the most basic level? With 6.5 million passwords stolen from LinkedIn and another 1.5 million passwords stolen shortly after from E-Harmony, possibly by the same hacker, password security is at the front of the minds of all computer users.  Since users of thoseservices had to change passwords, it would be a...

Spotlight on your bank account…yes, YOUR bank account

Spotlight on your bank account…yes, YOUR bank account

Spotlight on your bank account…yes, YOUR bank account There’s a race occurring daily and it’s as competitive as any competition imaginable. What’s at stake you ask? Your bank account. Cybercriminals are hard at work, chipping away at any form of protection you or your bank can throw at them. Its all in the numbers..The bad guys get as many attempts as they want...

DaaS Live Demo Webinar HERE

DaaS Live Demo Webinar HERE

Our Webinar on Getting Out of the Box and Into the Cloud Part 2 is now available.  If you missed it, or just want to see it again, you can catch it below. embedded by Embedded Videovimeo Direkt...