Security Considerations for Data in the Cloud
Greg Mooney | | Cloud | Security
On-premise data centers vs. the cloud: which environment offers stronger data security?
Greg Mooney | | Cloud | Security
On-premise data centers vs. the cloud: which environment offers stronger data security?
2019 was an interesting year for cybersecurity, with a wide variety of data breaches that drove a growing awareness of the essential nature of cybersecurity and perhaps a deserved respect for those in the industry.
One of the most significant issues faced in a Microsoft Windows environment is the ability to steal credentials and utilize these credentials to move throughout the network laterally.
Adversaries can utilize MITM attacks to steal credentials, even when they are protected by SSL.
One of the best ways to protect your servers and workstations from malware is to limit the execution of untrusted files.
Jeff Edwards | | Security
There are lots of file transfer protocols to choose from, but one that’s rarely discussed in depth is AS2. In this article, we take a deeper look at AS2, how it stacks up against SFTP, and why you would choose one or the other.
Jeff Edwards | | IT Insights | Security
Time and time again, retailers prove to be a popular (and easy) target for hackers. The tangible and intangible costs for an e-commerce site that’s been breached can escalate quickly. In this post, we'll explore the issue, and outline some solutions.
Jeff Edwards | | IT Insights | Security
If your business deals with credit card payments in any way, then PCI compliance is going to be a fact of life, and an essential part of running your business securely and efficiently. PCI compliance is a critically important step in protecting your customer's or...
Greg Mooney | | Security
If your organization is finding it difficult to comply with PCI DSS, the Payment Card Industry Data Security Standard, it could be due to some of the misconceptions about the standard.
Secure Socket Layer (SSL) or Transport Layer Security (TLS) refer to security technologies that encrypt data sent between a web server and web browser.
As IT pros, we’ve been aware for quite some time that some users are a threat to security, whether by their use of shadow IT, their susceptibility to social engineering attacks from cybercriminals, or by using their employee role and access permissions to compromise data...
Dan Franciscus | | IT Insights | Security
The process of securely installing software in Windows is something that IT professionals grapple with, especially in an enterprise setting.
Jeff Edwards | | Cloud | File Transfer | Security
The cloud is a fact of life in 2019. From basic cloud collaboration tools to storage buckets on massive cloud platforms like Azure and AWS, most businesses perform thousands of cloud file transfers every day, whether they’re aware of it or not. For businesses and IT...
Mark Towler | | Security
A month ago we told you how MFA (Multi-Factor Authentication) is an essential part of your encryption strategy. This month we’re letting someone else tell you the same thing for even more confirmation.
Jeff Edwards | | File Transfer | Security
By now, you should know that controlling access to sensitive files, devices, tools, and network areas is of utmost importance in cybersecurity, but you should also know that it’s not enough to simply control how users access resources. It’s equally important to be able...
Greg Mooney | | IT Insights | Security
APIs are becoming a huge part of how healthcare organizations provide better care to patients. But what about the security concerns with APIs?
Greg Mooney | | Security
Nobody does IT security better than you and your InfoSec team. You developed a strategic plan that prevents most breaches, and for those that do slip by your perimeter defenses, you have a great tactical plan to identify and mitigate attacks as quickly as possible....
Mark Towler | | Security
Security policies are prone to change, and you need to keep your users up-to-date on those changes so that they won't violate the terms of the policy, but doing so is often easier said than done.
Greg Mooney | | Security
FTP (File Transfer Protocol) has been the standard bearer for sending or moving files too large for email. Today, those file transfers contain the lifeblood of an organization and so Secure FTP is now critical.
Jeff Edwards | | File Transfer | Security
If you're using secure file transfer tools, chances are you're security conscious. Maybe you're working in a highly-regulated industry, or perhaps you don't want your company on the front page of the newspaper for getting hacked. Whatever the case, if you're securing...
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.