The cost of prevention is much cheaper than the fallout related to an actual hack. Learn more now.
According to the White Hat 2018 “Website Security Statistics Report” there are many business verticals missing the mark on securing their websites. In the category of Accommodations/Food Services, 52% of websites are deemed as “Always Vulnerable.”
Business leaders don’t always view security threats the same way that IT departments do. Business people think about spend in a risk reward paradigm. They tend to ask questions like; What am I getting for the dollars being spent? Will this purchase make us more secure?
Unfortunately, these days most of us are very familiar with Phishing and Spear Phishing Attacks. Most often times hackers will target end users with a clever email that unwittingly opens an attack vector on the users machine.
Not that long ago I identified that our Primary DC was not replicating to the secondary DC. After some investigation, I figured out that the secondary was handling all of the Domain Traffic and the GPO. The primary was handling only DNS and DHCP.
There is a lot of talk and news about file-less malware. We are encouraging our clients to learn and try new advanced protection products. But make no mistake, Antivirus is not going away because viruses are not going away.
File-less malware is becoming more and more of a problem. Why? Because it’s working. Traditional Security solutions provide a great deal of protections for current environments. However, they also create a framework for how to propagate an attack.
With all the electronic devices in my house I sometimes wonder, has someone figured out how to listen in on what’s happening at our house? After all, if you hacked our Echo or doggie camera, you certainly could.
Last week I was talking to Kirk Hoaglund of Clienktek (www.clienktek.com) about web app development and security. Kirk’s firm helps companies bridge the gap between legacy on premier apps and the cloud.
As many in the IT Security business are aware of, Petya Ransomware is leveraging the same Microsoft EternalBLue exploit that WannaCry targeted 30 days ago.
If we’ve learned anything in Productive Corporation’s seventeen years as a company, it’s that we not all products are made equal. While we try to provide mid-size business with a range of products so they can choose what is right for them we’d be lying if we said we didn’t pick favorites that we then highlight in our bi-weekly live webinar series.
Since debuting in 1999, Active Directory has been the go-to directory service for many mid-sized and enterprise companies. And though it has its issues, many of the companies that we see running Active Directory haven’t had it serviced in ages nor had old users, old policies, and old groups reviewed and culled.
If you’ve ever tuned into one of our biweekly webinars or perused our other video content, then you know that we often use those events as opportunities to give you guided tours of some of the many network and endpoint security products that we carry.
When it comes down to it, there are countless reasons that a business or organization develops issues with its network health. But when it comes down to it, there tends to be three root causes that tend to be the cause of many of the problems we see.