Two of the biggest challenges that CISOs face today are ensuring that security and business strategies are in alignment and that security solutions are focused on solving the right problems. More often than anyone wants to admit, security teams spend significant resources trying to resolve a specific set of security challenges only to find out that they either don’t support critical business objectives or that the organization has been compromised by an attack coming from an unrecognized threat vector.
Addressing Today’s Risks Requires Reliable Threat Intelligence
Posted by Fortinet on Feb 26, 2019 9:30:15 AM
Topics: Business Goals, Business Objectives, Network Security, Threat Intelligence, Digital Transformation, Security Risk
The end of September, Facebook disclosed the discovery of a security flaw on its computer network that may have affected active accounts exposing the personal information of up to 50 million users including top executives Mark Zuckerberg and Sheryl Sandberg according to sources close to the investigation.
Topics: Security, Hackers, Data Breach, Multi Factor Authentication, Dual Factor Authentication, Facebook, Scam
If you utilize LinkedIn services with the only the default username and password authentication you are at risk of getting hacked, even if you have an account that you rarely access and use.
Topics: Security, Multi Factor Authentication, Dual Factor Authentication, LinkedIn
If you log in to Amazon services with only the default username and password authentication you are at risk of getting hacked, even if you have an account that you rarely access.
Topics: Security, Multi Factor Authentication, Dual Factor Authentication, Amazon
If you utilize Facebook services with the only the default username and password authentication you are at risk. Even if you have an account that you rarely access.
Topics: Security, Multi Factor Authentication, Dual Factor Authentication, Facebook
SD-WAN has the ability to redefine how organizations manage the communications between physical sites and cloud hosted systems, possibly connecting one of the largest barriers to cloud computing.
Topics: Security, Fortinet, Fortigate, SD-WAN, SDWAN, MPLS, Software Defined Wide Network Area
The “Hot Button” in the telecommunications industry is Cloud telephony. Mitel has a unique set of offerings with MiCloud Connect and MiVoice Connect. They provide the only solution that offers the same user interface for Cloud, On-Premise and Hybrid environments. Now, if the user interface and the handsets are the same, how does one choose the appropriate solution? Here are some comparisons to consider:
Topics: phone system considerations, Cloud, Onsite, Unified Communications, MiVoice Connect, MiCloud Connect
Encrypting data-at-rest is essential for protecting data, and is required by most IT regulatory requirements and compliance laws.
Topics: Security, Nutanix, AOS 5.8, SED, Encryption, Key Management, Acropolis, Data at Rest
Recommendations To Protect Against WannaCry Ransomware
Posted by Brian Dooley on Jun 30, 2017 4:41:57 PM
The WannaCry ransomware attack is one of the first large scale attacks that utilize a weaponized version of the system exploits leaked by the Shadow Brokers hacking group from the United States NSA in 2016.
Topics: Cyber Security, Cyber Attack, Ransomware, WannaCry
Protecting your data IS protecting your business.
Posted by LANAIR Group, LLC on May 26, 2017 2:09:53 PM
Topics: Data Protection, Managed Backup, Disaster Recovery, BCDR, Ransomware