Call Us Today! 770.643.4400|

About Neil Matchan

This author has not yet filled in any details.
So far Neil Matchan has created 11 blog entries.

Mobile Device Management: No Longer an Option

It's 5 O'clock - Do You Know Where Your Company Phone Is? Mobile Device Management (MDM) is no longer a "nice-to-have" for businesses. As the world has gone increasingly mobile, businesses have been faced with the challenge of implementing and managing a mobile workforce. According to a Forbes survey from 2015, 81% of CEOs see mobile technologies as being strategically important for their enterprises. A strong MDM system will allow for easy device onboarding, configuration, asset inventory [...]

2018-01-26T12:56:20-05:00January 25, 2018|

Wireless Security: More Important than Ever

Think Wi-Fi has become more secure in the past few decades? Recent news proves it’s time to think again. It’s been nearly two decades since mobile Wi-Fi snooping, known as “wardriving,” became popular. This practice, where individuals drive around in cars with Wi-Fi “sniffers,” looking for open or easily hackable Wi-Fi networks, has been joined by warwalking, warbiking and even warballooning. For many, seeking out and hopping on other Wi-Fi networks was a [...]

2017-11-10T12:53:17-05:00November 10, 2017|

Geographic Information Systems for Emergency Response: InterDev’s Award-Winning Solution

Update November 13, 2017: The URISA Award and the GIS team in partnership with InterDev were recognized by City of Sandy Springs Mayor Rusty Paul at the City Council Meeting on November 7th. Although the first documented instance of geographic information system (GIS) mapping was in 1832 (a hand-tinted cholera epidemiology map in Paris), GIS as a discipline didn’t really find its footing until the 1960s and 1970s. Even then, it was a much more elementary technology [...]

2017-11-14T15:37:05-05:00November 2, 2017|

If You Don’t Control Your Security Risk, Your Employees Will

Earlier this year, we talked about the Wannacry and Petya ransomware attacks and the part that human mistakes play in their success. There, we focused on the importance of making system updates a priority. You can read that article, here. This month, we’ll explore other “computer control” missteps that invite cyberattacks and system infections. Inappropriate or missing administrator controls With Wannacry, the biggest source of infection was non-IT personnel with local administrator rights. When security [...]

2017-09-21T14:05:17-04:00September 15, 2017|

Cyber-Protection for the Heart of Your Enterprise—the “Gooey Center”

For most of the past decade, security experts have been proclaiming every year “the Year of the Hack,” and yet each year, cyber criminals manage to up their game. This year has been especially dangerous, as criminals used ransomware to lock up millions (if not billions) of files and extort an untold amount of money from their victims. Making matters worse, in many cases the ransom was a distraction rather than the end game, with [...]

2017-09-15T08:07:07-04:00August 20, 2017|

Can Cybersecurity Save Humanity? It’s Up to the Victims to Decide

As cyberattackers become increasingly aggressive while expanding their targets to critical systems that literally could impact people’s lives, we are left to ask, “What’s next, and how can we stop it?” I’ll provide some advice here, but first, let me share a little background. It’s longer than our usual articles, so please stay with me. The Situation Is Moving from Serious to Dire If you weren’t affected directly, you probably heard about the WannaCry attack, [...]

2017-08-01T13:29:45-04:00August 1, 2017|

Search Warrants Can Include Your Fingers?

In the latest battle for investigative techniques to defeat password-protected smartphones, federal prosecutors have begun including in search warrants not only personal phones (“dwelling contents”) at a location subject to search but also the fingerprints of the occupants. By doing this, authorities may be able to access the data stored on the phones found at a residence, since the warrant can compel ALL occupants of a dwelling to surrender their fingerprints and, by extension, use them to [...]

2017-05-02T11:12:00-04:00May 15, 2017|

Nothing Beats User Training as a Deterrent

With the advent of Advanced Threat Detection (ATD), sandboxing—whereby a potentially dangerous email is detonated in a safe environment before delivery—has become a common mechanism for stopping malicious attachments in their tracks. Unfortunately, the spread of this technique may also be engendering some complacency among security teams. Is the sandbox approach bulletproof when it comes to preventing malicious attachments from getting into your network? From what we have seen, the answer is “No.” Already seen [...]

2017-05-01T04:43:30-04:00May 1, 2017|

Cloud Stocks Take a Hit, but the Cloud’s Value Continues to Climb

Anyone who follows technology news—or reads Wall Street bulletins—likely has heard that several cloud computing stocks took a beating in the market in early February, as a few companies lowered their guidance for 2016. At first glance, this might cause business leaders to wonder if cloud computing has hit its peak, and whether it is wise to continue moving resources—and technology funding—to the cloud. The answers to these questions are a resounding “No,” and “Yes!” [...]

2016-12-21T05:37:23-05:00February 23, 2016|

First Vulnerability to Expose Windows XP Risk

At Issue On April 26th Microsoft issued a security advisory concerning all versions of Internet Explorer. This vulnerability could allow an attacker to execute arbitrary code on a victim’s computer. The vulnerability effects all versions of Internet Explorer from version 6 through version 11. This is considered a “Zero Day” attack in that there is not currently a fix for the issue. At this time Microsoft has detected limited attacks in the wild and [...]

2015-11-06T05:20:16-05:00April 29, 2014|