Blog
Latest Post
The Pillars of Email Security: Encryption, Filtering, and Training
In corporate America, email is still the go to for communication. It also remains the top threat vector for hackers to gain entry.. The tactics of cyber criminals are evolving every day. Organizations must make sure that they safeguard their channels and prevent...
Recent
If You Think Security is a Commodity…Read On
In the 2000’s many end users believed that Anti-virus was a commodity. It wasn’t hard to find Security Companies that agreed with this notion. In those days the argument was simple to make, there are few kinds of threats that can be stopped with a signature. The...
Strengthening Security Posture in 2020
There is a great documentary from 2016 called Zero Days. It covers StuxNet, how it brought down Nuclear reactors in Iran, and who was potentially behind it (Israel and the United States.) Spoiler alert, but one of the final commentaries is that this attack led Iran...
2 Tips to Improve Gateway Security
HTTPS Inspection at the Gateway Stops More Threats at the Perimeter. NextGen Firewalls can be a great deterrent against ransomware. They can detect when a machine is trying to get to known bad parts of the internet and block it. They can use content and...
What You Can Learn from Facebook’s Security Lawsuits
Last fall, Facebook was the target of a data breach that impacted nearly 30 million of its 2.4 billion users. In addition to the data breach, the FTC has been investigating the activities of the political consulting firm Cambridge Analytica’s unauthorized access to...
More Posts
Sophos Cloud Optix and Public Cloud Security
Cloud computing, including Software-as-a-Service (Saas) and Platform-as-a-Service (PaaS), has revolutionized the way businesses use technology. For organizations, moving email or application workload to the cloud can allow them to leverage affordable storage or...
AI and The Future of Cybersecurity
Cybersecurity has always been a rapidly evolving field, after all, security needs to try to keep up with hackers, malware, and other threats. Today, the latest evolution in cybersecurity is the use of AI to predict threats. Today, we’re seeing a wave of...
Ransomware Attacks on U.S. Cities
You’ve probably heard about cities across the U.S. being held hostage by ransomware attacks. It seems like attacks like these are making headlines every couple of months. The story is usually the same, a city agency or perhaps the entire city’s government computers...
Protecting Against Black Hat Hackers
While most hacking is illegal, sites like Hacker’s List have gotten a lot of news coverage in recent years. These sites claim that you can hire a hacker anonymously and safely pay them with either your credit card or Bitcoin. While hacker for hire sites may claim...
Four Ways to Improve Cloud Security
Public Cloud Breaches We have a new product from Sophos called Cloud Optix. It provides security visibility across the big 3 public clouds and a few others. As I was doing my due diligence to understand the threat landscape and where a product like this can be...
Caveat Emptor: Don’t Take Security for Granted with Public Cloud Services
Security Falls on the Customer I remember when we got our first Hyper-V server. We spec’d it out to be able to support our growth for 3 years. That lasted about a month. Once I saw how easy it was to provision machines, we maxed out our memory and processing power...
The Risk You Take From Not Proactively Spending on Security: A Cautionary Tale
We’ve all seen the headlines; breaches discovered months (or years) after the initial attack. Often, the length of time that hackers have access to a stolen network means the attack is deep into the systems and the amount of data being stolen is massive. Of course,...
The Pros and Cons of Generated Passwords
There are many websites online today that promise to create randomly generated passwords for you. These password generators, also known as linear congruential generators, use algorithms to create a random string of letters, numbers and special characters. While...
How to Stop Hacks Caused by Intel Chip Flaws
Recently, it’s come out that there is a flaw in Intel chips that has left millions of computers vulnerable. This flaw allows attackers to steal any data that the Intel processor has recently accessed. The attack, dubbed ZombieLoad, was discovered by Graz University of...