The Story Patching Tells
06/14/19 In post #3 of this information security series, let’s cover one of the essential components in an organization’s defense strategy: their approach to patching systems. Ever…
06/14/19 In post #3 of this information security series, let’s cover one of the essential components in an organization’s defense strategy: their approach to patching systems. Ever…
06/03/19 In the second post in this information security in a hybrid IT world series, let’s cover the best-designed security controls and measures, which are no match for the human…
05/22/19 Welcome to the first in a five-part series focusing on information security in a hybrid IT world. Because I’ve spent the vast majority of my IT career as a contractor for …
05/08/19 More importantly, most common types of cyberattacks can be prevented with foundational controls. I’m willing to bet that most small- to medium-sized businesses (SMBs) don’…
05/01/19 The pace of cybersecurity is moving faster than ever, and IT pros have to stay ahead of the game if they hope to stay ahead of hackers. Unfortunately, many organizations d…
04/10/19 It’s likely no surprise to anyone that the amount of data collected, stored, and analyzed continues to grow exponentially across the globe. From a security perspective, it…
03/15/19 In this episode, Head Geeks™ Destiny Bertucci and Thomas LaRock will show you how to ward off security dangers using SolarWinds software. See how SQL injection can be root…
02/20/19 Someone steals credentials from one of your client’s executives. They guess the username and password to their email account. From there, the cybercriminal can send out ta…
02/13/19 Few messages strike fear in the hearts of IT operations staff like the dreaded scan results from your security team. These messages often appear in your inbox early on Mon…
02/06/19 When you hire someone, you expect them to care about your business. You want them to take care of your intellectual property and data. Unfortunately, not everyone has the …
01/23/19 As the cyberlandscape continues to evolve, so do the methods of attack used by cybercriminals. And it isn’t just outsiders you have to worry about; insiders can be respons…
12/19/18 According to the recent Ponemon 2018 Cost of a Data Breach report, the average time to identify a data breach was 197 days[1]. If something slips by your defenses, you nee…