Two massive chip vulnerabilities are here and the security industry is scrambling for answers. Misinformation is everywhere, and even the patches are wreaking havoc.
Find the answers to your questions on Spectre and Meltdown in this post. You’ll see the problem, the solution, and know which rumors are fake news.Continue reading
Another year of cyber attacks is almost behind us. We’ve seen global ransomware epidemics, destructive lone-wolf hackers, and the tripling of the worst data breach ever reported.
Join us for a review of the top attacks in 2017. You’ll see how they happened so you can avoid making the same mistakes.Continue reading
Did you know mobile devices can be exposed to more security threats than desktops? Makes you wonder – how many smartphones are on your network right now?
In this post, you’ll see the top network security threats of mobile devices and how to manage them to protect your network.Continue reading
Every year is different in network security. Threats change, new problems emerge, and your network has to evolve.
Stay ahead of the curve. See the top eight types of network attacks recorded in Q2 2017. You’ll get a review of the data and descriptions for each type.Continue reading
Some malware can hide in plain sight – injecting itself into RAM and active processes. This makes it almost impossible to detect with traditional antivirus.
Get an overview of “fileless malware”, how it works, and how it can takeover. You’ll also see examples of recent fileless attacks against restaurants, website visitors, and more.Continue reading
In network security, you have to prioritize. You could take hundreds of steps to improve your security, but which ones really matter?
See just five security controls you can use to stop about 85% of all cyber attacks – basically, most of the common attacks seen today. The controls come from the CIS 20 (formerly known as the SANS 20).Continue reading
You need to know the devices that are allowed to use your network. The good news is you do not need a complicated or expensive asset management system to do it.
See a fast and easy way to document the devices on your network. You can get organized and start saving time.Continue reading
Some of the most cunning and dangerous hackers in the world target companies in the finance and energy sectors. How do these companies prevent attacks? And what can you learn from them?
See five cybersecurity best practices from the finance and energy sectors. The tips were published by a federal task force in June 2017, and we point you to additional resources.Continue reading
Medical devices have terrible security just like everything else in the Internet of Things. But while a hacked thermostat is annoying, a hacked insulin pump can kill you.
See the top three fears of health IT pros around medical device security. You’ll get examples of potentially fatal hacks and malware that can ensnares the entire network.Continue reading