Calyptix Blog

Mobile Security Threats to Your Network: Top 7 and Tips

by Calyptix, November 15, 2017

Top-Mobile-Security-Threats---1

Did you know mobile devices can be exposed to more security threats than desktops? Makes you wonder – how many smartphones are on your network right now?

In this post, you’ll see the top network security threats of mobile devices and how to manage them to protect your network.

Continue reading

Filled under : Top threats
Tagged on : top threats

Is Port Scanning Legal? Answers for IT Companies

by Calyptix, November 7, 2017

Port-Scanning-Legal---1

Port scanning is almost as common as sending an email. IT companies do it every day – but so do hackers. So is port scanning legal?

Find the answer – and see how to protect your IT company from lawsuits stemming from port scans.

Continue reading

Filled under : Top threats
Tagged on : top threats

Healthcare: Top 5 Web Application Attacks in 2017

by Calyptix, October 30, 2017

3-medical-device-security

Web applications are booming in healthcare – unfortunately, their security standards need a checkup and may require surgery.

See the top five types of web application attacks in healthcare during Q2 2017. You’ll get an overview of the types and how they compare to other target industries.

Continue reading

Filled under : hipaa
Tagged on : HIPAA

Top 8 Network Attacks by Type in 2017

by Calyptix, October 23, 2017

Types of Network Attacks

Every year is different in network security. Threats change, new problems emerge, and your network has to evolve.

Stay ahead of the curve. See the top eight types of network attacks recorded in Q2 2017. You’ll get a review of the data and descriptions for each type.

Continue reading

Filled under : Top threats
Tagged on : top threats

Fileless Malware: How it Steals in Plain Sight

by Calyptix, October 17, 2017

Fileless Malware 1

Some malware can hide in plain sight – injecting itself into RAM and active processes. This makes it almost impossible to detect with traditional antivirus.

Get an overview of “fileless malware”, how it works, and how it can takeover. You’ll also see examples of recent fileless attacks against restaurants, website visitors, and more.

Continue reading

Filled under : Top threats
Tagged on : top threats

5 Security Controls that Stop 85% of Cyber Attacks

by Calyptix, October 9, 2017

security-controls-1

In network security, you have to prioritize. You could take hundreds of steps to improve your security, but which ones really matter?

See just five security controls you can use to stop about 85% of all cyber attacks – basically, most of the common attacks seen today. The controls come from the CIS 20 (formerly known as the SANS 20).

Continue reading

Filled under : Top threats
Tagged on : top threats

Network Inventory Made Easy: 5 Simple Steps

by Calyptix, October 2, 2017

Network-inventory-6

You need to know the devices that are allowed to use your network. The good news is you do not need a complicated or expensive asset management system to do it.

See a fast and easy way to document the devices on your network. You can get organized and start saving time.

Continue reading

Filled under : Top threats
Tagged on : top threats

5 Network Security Best Practices from High-Attack Industries

by Calyptix, September 11, 2017

Network-security-best-practices-1

Some of the most cunning and dangerous hackers in the world target companies in the finance and energy sectors. How do these companies prevent attacks? And what can you learn from them?

See five cybersecurity best practices from the finance and energy sectors. The tips were published by a federal task force in June 2017, and we point you to additional resources.

Continue reading

Filled under : Top threats
Response: 2 Comments
Tagged on : top threats
Page 1 From 14