Our Blog

Stay up to date with the latest articles in Network Security
July 14, 2014

PCI DSS: Easier and cheaper compliance with SAQs

Swiping Credit Card

Pretend PCI DSS compliance is a highbar. How you handle cardholder data will determine whether you have to throw a small, light portion of your network over the bar or the whole hulking mass of it.

IT service providers can make compliance easier -- but how?

Continue reading
Continue Reading
June 3, 2014

Top 10 Security Vulnerabilities of 2013


The top cause of security vulnerabilities are outdated and unpatched systems. See the data to prove it, and know which types of systems are more commonly out of date.

Inside you'll see the top 10 external security vulnerabilities, the top 10 internal vulnerabilities, and the most common causes, all found in the 2014 Global Threat Intelligence Report.

Continue reading
Continue Reading
May 20, 2014

4 Security Insights via 2014 Verizon Data Breach Investigations Report

security breach category by industry chart

This year's Verizon Data Breach Investigations Report has a lighter tone, but its data and analysis are as sobering as ever.

Get insights and charts from the report, and see which types of security incidents happen most often in your clients' industries.

Continue reading
Continue Reading
March 4, 2014

Top Threats: Massive denial-of-service attacks

DDoS attacks are nothing new, but the storms of traffic they use to drown targets in 2014 have grown into hurricanes. Continue reading
Continue Reading
February 10, 2014

Marketing Tools: 10 Small Businesses Hit by Hackers

debtHacked small businesses are rarely in the news. Your SMB clients might hear about the breach at Target, but they never hear about the local auto dealer who lost more than $20,000 to cybercrime. This gives SMBs a false sense of security. They think they are too small for hackers to bother. The truth is that they are breached far more often than large firms. Continue reading
Continue Reading
January 28, 2014

Top Threats: How to prevent Cryptolocker

Cryptolocker is the notorious, ransom-charging malware that continues to stop clients in their tracks. In this profile, we cover the basic info and give you a kit that can easily help you protect clients. Continue reading
Continue Reading
January 27, 2014

Top Malware Sites and Unsafe Servers


Malware sites increasingly use services like Google and GoDaddy for hosting. The Washington Post even called Amazon a “hornet’s nest of malware."

These trends and others are described in the SERT Quarterly Threat Intelligence Report Q4 2013. We dig through the report to give you the top malware sites, hosting providers, and more to watch out for.

Continue reading
Continue Reading
1 14 15 16

About Us

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology. Our customers do not waste time with security products designed for large enterprises. Instead, we make it easy for SMBs to protect and manage networks of up to 350 users.
call us
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram