How to Detect and Stop Cryptomining on Your Network
Jeff Edwards | | Security
If 2017 was the year of the ransomware attack, then 2018, insofar as it can be defined by malware, was the year of cryptojacking.
Jeff Edwards | | Security
If 2017 was the year of the ransomware attack, then 2018, insofar as it can be defined by malware, was the year of cryptojacking.
Jeff Edwards | | File Transfer | Security
Collaboration is of utmost importance in the modern workplace, but when done incorrectly, a collaborative environment can also be an insecure one. Here's how you can allow increased workplace collaboration, without reducing security.
Nate Lewis | | File Transfer | Security
"The call is coming from inside the house...” This line from 1979’s When a Stranger Calls terrorized audiences by introducing the notion that the things we should be most fearful of may be in the spaces we feel most safe. This idea translates neatly to the enterprise...
In the BFSI (banking, financial services and insurance) industry, choosing a managed file transfer solution is rather simplified as FTP alone is not enough to meet the necessary regulatory and compliance requirements.
Username and password have long been the main method of authentication—and they remain so. But other authentication factors are often added to passwords to improve security. How well do these multi-factor authentication approaches work, and should businesses approach...
You likely already realize that file transfers using the file transfer protocol (FTP) expose your sensitive data to high risks.
Prateek Singh | | Cloud | IT Insights | Security
Amazon Web Services (AWS) offers a service known as Identity and Access Management (IAM) that lets AWS Administrators provision and manage users and permissions in AWS cloud. AWS IAM can prove very useful for System Administrators looking to centrally manage users,...
Nate Lewis | | Security
One look at the headlines is all it takes to see why security is at the forefront of every IT team’s mind. Hacks, data theft—you name it; some of the largest corporations have succumbed to these pitfalls over the past few years, and there’s no end in sight. It's no...
Readers of previous posts are aware of my reservations on the current ubiquitous drive to connect absolutely everything (from the frivolous to the useful) to the internet but there is no denying that the trend will continue unabated. This will create security risks that...
Nate Lewis | | File Transfer | Security
Privacy is something that every organization needs to take seriously. When customers and clients trust an organization with their private information, that trust needs to be respected. As with healthcare, the insurance industry needs to adhere to significant regulation.
Kevin Conklin | | File Transfer | Security
Nearly a million servers around the world still run the unsecure legacy FTP protocol and are actually configured for ‘anonymous’ access. Not good.
With OpenSSH, you can remote into any operating system from any operating system. This is a wonderful thing!
FIPS 140-2 is a requirements document that sets the minimum strength level for data encryption used in Sensitive But Unclassified (SBU) federal operating environments. But its influence goes far beyond this significant but delimited area.
Network Security has multiple concepts. One such model is the Before-During-After concept, which I will break out into different phases. Specific to incident and problem management in IT, this methodology plays an important role for IT teams.
For the purposes of this post, we are concerned with two relevant options, namely File Transfer Protocol (FTP) and Managed File Transfer (MFT). The second, being managed, obviously offers more features than a standard file transfer solution. But, which solution is best...
Adam Bertram | | Security
Attackers wanting to steal your information online are some of the most creative people alive. It’s amazing how many ways they can come up with to steal your information. One of those ways is through a technique called cross-site scripting or XSS for short.
Nate Lewis | | Security
We’re living in the age of information. In both the world of the enterprise and in our own personal lives, we expect speed first and foremost. The exchange of data between customers, employees, and partners is become a critical component of business operations. Shadow IT...
Greg Mooney | | Security
Nobody likes to be audited. It’s invasive and unpleasant, but being prepared for it can make the process much easier.
Julianna Bernardi | | Security
If you work in IT for a regulated industry, security is one of your top priorities. Especially when working for the government, healthcare or finance, it is extremely important that products and services adhere to government-approved security requirements to ensure that...
Greg Mooney | | Security
External file transfers of digital assets are risky for everyone—no matter if you’re a healthcare organization, financial institution, insurance company, retail store, manufacturer or in education.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.