6 Steps for Creating a Manufacturing Cybersecurity Program
The rapid digitization of manufacturing, especially with the interconnectivity of IoT, has resulted in novel and unprecedented cybersecurity risks.
The rapid digitization of manufacturing, especially with the interconnectivity of IoT, has resulted in novel and unprecedented cybersecurity risks.
Greg Mooney | | Security
Recently, I had a chance to talk with Arun Vishwanath about social engineering, legacy systems, and security vulnerabilities on home devices, such as routers, on the Defrag This podcast.
Greg Mooney | | Security
Does your business rely on the Secure Copy Protocol (SCP) to enable remote users to exchange files with each other and with customers and business partners? If so, it might be time to consider another approach!
With most office workers still working at home, the network has now become the major linkage between employees and their jobs.
Greg Mooney | | File Transfer | Security
The importance of online collaboration took a quantum leap as the COVID-19 pandemic forced just about every office worker to stay at home.
Greg Mooney | | Security
MD5 is still being used today as a hash function even though it has been exploited for years. In this article, we discuss what MD5 is; it's history, and how it is used today.
It has taken a long time, but the medical community is finally embracing the information age. Thanks to the widespread adoption of toolsets such as Epic Systems, electronic health records (EHRs) are now making critical health information available when and where it is...
Greg Mooney | | Security
To this day, FTP (file transfer protocol) and the more secure SFTP (secure file transfer protocol) are still the most used standard to move files over the Web. It’s cost effective, quick and easy to deploy, and if used correctly in a regulated industry it keeps users...
Greg Mooney | | File Transfer | Security
Large scale data migrations are a grueling process. This is why multiple failovers and automation in a managed file transfer tool will be your best option in avoiding data loss or corruption.
Adam Bertram | | Security
OpenSSL has been one of the most widely used certificate management and generation pieces of software for much of modern computing.
Mark Towler | | Security
Progress has just released MOVEit 2020, the latest version of their award-winning secure and managed file transfer solution.
Greg Mooney | | Security
Ted Kim, CEO of Private Internet Access, joins the podcast to chat about VPNs, privacy online, and how the cybersecurity threat landscape has changed during the COVID-19 pandemic.
As a company owner, you may well think that you can install closed-circuit television (CCTV) cameras as you see fit on company premises, but the reality is a little different.
Greg Mooney | | Security
The sense of urgency around cybersecurity is reaching a whole new level for state and local governments.
Adam Bertram | | Security
Windows Defender comes with Windows 10 is a great way to keep your computer protected from malware.
How do we protect ourselves from rogue devices? What are the current solutions?
Wire fraud is a federal offense under U.S. law and refers to fraud committed using electronic communications, such as telephone or computer. Unfortunately for financial institutions, wire fraud is on the increase, and not just in the U.S.
Relative to the sensitivity of the data that they protect, law firms have some of the laxest information security that you can find.
Zoom has seen hyper-growth during what IT teams are calling the "new normal." But that fame comes with a cost--the attention of hackers and security pros.
Bursting with personal information and financial details for students and employees, as well as valuable research information that could result in financial loss if stolen, Universities are seen as having lax systems and an abundance of reward.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.