Expert Insight

Most organizations will face the question of whether or not to consider investing in IT consulting, keep operations in-house, or simply outsource their entire IT environment. The truth is, not all organizations know exactly what they’re doing when it comes to IT and it can greatly slow their growth and progress –...

Firewalls are par for the course when it comes to discussing cyber security protection. From households to businesses, they're considered to be fairly simple and easy solutions to combat cyber security attacks. The types of attacks are becoming more unique and greater in quantity, meaning that groups are realizing they need more...

We've written about two-factor authentication in the past, and how it is a vital part of any cyber security plan whether you are a single user or company with hundreds of employees. Though it does make challenging for an attacker to infiltrate your network with these precautionary measures in place, new tactics...

The Executive Summit for Cyber Security brings together C-level IT security executives, industry analysts, and solution providers to discuss challenges and best practices so attendees can come away with advice and knowledge to start proactively protecting their environment from the latest security threats. This year’s event featured a moderated roundtable discussion...

A hospital in Southern California made news last week after being the victim of ransomware for 10 days. Hollywood Presbyterian was only able to regain access to its electronic medical records (EMR) system after paying 40 bitcoins, or roughly $17K. Sophos put the impact of the ransomware on Hollywood Presbyterian bluntly: "This was...

Saving your data in the cloud could save your company in more ways than one - the rise of cyber crime and the increasing need to store more and more data makes companies and individuals susceptible to data theft, corruption, or loss. Many businesses will back up data with a secondary,...

Emerging Threat - Juniper ScreenOS Backdoor An advisory has been issued that unauthorized code in the ScreenOS software that powers Juniper's NetScreen firewalls has been discovered. There are two distinct issues: a backdoor in the VPN implementation that allows a passive eavesdropper to decrypt traffic and a second backdoor that allows an attacker to...

The truth: we need the Internet. According to Statista the United States has over 200 Million Internet users; that's over two thirds of us. The problem: most people don't know how unsafe they are when using the Internet. Sure, websites put up “safety seals” and purchase SLL certificates to help ease consumer or...