Blog
Latest Post

If You Think Security is a Commodity…Read On
In the 2000’s many end users believed that Anti-virus was a commodity. It wasn’t hard to find Security Companies that agreed with this notion. In those days the argument was simple to make, there are few kinds of threats that can be stopped with a signature. The...
Recent

Sophos Cloud Optix and Public Cloud Security
Cloud computing, including Software-as-a-Service (Saas) and Platform-as-a-Service (PaaS), has revolutionized the way businesses use technology. For organizations, moving email or application workload to the cloud can allow them to leverage affordable storage or...

AI and The Future of Cybersecurity
Cybersecurity has always been a rapidly evolving field, after all, security needs to try to keep up with hackers, malware, and other threats. Today, the latest evolution in cybersecurity is the use of AI to predict threats. Today, we’re seeing a wave of...

Ransomware Attacks on U.S. Cities
You’ve probably heard about cities across the U.S. being held hostage by ransomware attacks. It seems like attacks like these are making headlines every couple of months. The story is usually the same, a city agency or perhaps the entire city’s government computers...

Protecting Against Black Hat Hackers
While most hacking is illegal, sites like Hacker’s List have gotten a lot of news coverage in recent years. These sites claim that you can hire a hacker anonymously and safely pay them with either your credit card or Bitcoin. While hacker for hire sites may claim...
More Posts
Four Ways to Improve Cloud Security
Public Cloud Breaches We have a new product from Sophos called Cloud Optix. It provides security visibility across the big 3 public clouds and a few others. As I was doing my due diligence to understand the threat landscape and where a product like this can be...
Caveat Emptor: Don’t Take Security for Granted with Public Cloud Services
Security Falls on the Customer I remember when we got our first Hyper-V server. We spec’d it out to be able to support our growth for 3 years. That lasted about a month. Once I saw how easy it was to provision machines, we maxed out our memory and processing power...
The Risk You Take From Not Proactively Spending on Security: A Cautionary Tale
We’ve all seen the headlines; breaches discovered months (or years) after the initial attack. Often, the length of time that hackers have access to a stolen network means the attack is deep into the systems and the amount of data being stolen is massive. Of course,...
The Pros and Cons of Generated Passwords
There are many websites online today that promise to create randomly generated passwords for you. These password generators, also known as linear congruential generators, use algorithms to create a random string of letters, numbers and special characters. While...
How to Stop Hacks Caused by Intel Chip Flaws
Recently, it’s come out that there is a flaw in Intel chips that has left millions of computers vulnerable. This flaw allows attackers to steal any data that the Intel processor has recently accessed. The attack, dubbed ZombieLoad, was discovered by Graz University of...
How IoT Impacts B2B
The Internet of Things (IoT) has reached consumers in many ways. There are “smart” thermostats, refrigerators, lights, and home security systems that leverage the connection of the internet. For businesses, the IoT has also entered their networks in several ways. In...
How Old Threats Can Cause Big New Problems
Windows released XP in 2001, and in 2009 they ended support for it. However, in 2019, they released updated patches for Windows XP and Windows Server 2003. Why? Because they identified a vulnerability in the unsupported operating systems that hackers could exploit....
Office 365 Security, Backup, and Archiving
E-mail Security and Office 365 Okay, so you’ve moved to Office365, but did you bring your security with you? Many organizations are under the impression that because Microsoft can stop a few e-mails and tag them as Spam or malicious that it includes e-mail security. ...
Zero Trust Networks: The Future of Corporate Computing?
Businesses today need to use all of the security tools available to combat threats and stay ahead of hackers. Part of that includes moving to a Zero Trust security model.