Call Us Today! 770.643.4400|

Wireless Security: More Important than Ever

Think Wi-Fi has become more secure in the past few decades? Recent news proves it’s time to think again. It’s been nearly two decades since mobile Wi-Fi snooping, known as “wardriving,” became popular. This practice, where individuals drive around in cars with Wi-Fi “sniffers,” looking for open or easily hackable Wi-Fi networks, has been joined by warwalking, warbiking and even warballooning. For many, seeking out and hopping on other Wi-Fi networks was a [...]

2017-11-10T12:53:17-05:00November 10, 2017|

If You Don’t Control Your Security Risk, Your Employees Will

Earlier this year, we talked about the Wannacry and Petya ransomware attacks and the part that human mistakes play in their success. There, we focused on the importance of making system updates a priority. You can read that article, here. This month, we’ll explore other “computer control” missteps that invite cyberattacks and system infections. Inappropriate or missing administrator controls With Wannacry, the biggest source of infection was non-IT personnel with local administrator rights. When security [...]

2017-09-21T14:05:17-04:00September 15, 2017|

Cyber-Protection for the Heart of Your Enterprise—the “Gooey Center”

For most of the past decade, security experts have been proclaiming every year “the Year of the Hack,” and yet each year, cyber criminals manage to up their game. This year has been especially dangerous, as criminals used ransomware to lock up millions (if not billions) of files and extort an untold amount of money from their victims. Making matters worse, in many cases the ransom was a distraction rather than the end game, with [...]

2017-09-15T08:07:07-04:00August 20, 2017|

Can Cybersecurity Save Humanity? It’s Up to the Victims to Decide

As cyberattackers become increasingly aggressive while expanding their targets to critical systems that literally could impact people’s lives, we are left to ask, “What’s next, and how can we stop it?” I’ll provide some advice here, but first, let me share a little background. It’s longer than our usual articles, so please stay with me. The Situation Is Moving from Serious to Dire If you weren’t affected directly, you probably heard about the WannaCry attack, [...]

2017-08-01T13:29:45-04:00August 1, 2017|

Nothing Beats User Training as a Deterrent

With the advent of Advanced Threat Detection (ATD), sandboxing—whereby a potentially dangerous email is detonated in a safe environment before delivery—has become a common mechanism for stopping malicious attachments in their tracks. Unfortunately, the spread of this technique may also be engendering some complacency among security teams. Is the sandbox approach bulletproof when it comes to preventing malicious attachments from getting into your network? From what we have seen, the answer is “No.” Already seen [...]

2017-05-01T04:43:30-04:00May 1, 2017|

Do You Know What’s Running on Your Network? Hackers Do

In an address to IT professionals and others in January at Usenix Enigma 2016, 25-year National Security Agency veteran and “professional hacker” Rob Joyce* pointed out that cybercriminals have the time, patience and skill to understand their victim’s networks far better than organizational leadership—or even IT staff—does. Speaking to IT professionals, academics and others, he said, “You know the technologies you intended to use in that network. We know the technologies that are actually in [...]

2016-12-21T05:37:22-05:00July 15, 2016|

Cloud Security: The Biggest Threat Is Still On-Premise

With cloud adoption continuing to soar, many organizational leaders are considering the issue of cloud security. Virtually all cloud providers will assert that their solutions are more secure than the average on-premise security platform. Should decision makers believe them? Is any cloud security solution secure enough? The reality is that when properly configured, secured, and managed, cloud environments can be more secure than most on-premise systems. And, while cloud platforms do not necessarily come with [...]

2016-12-21T05:37:22-05:00June 23, 2016|

Public and Private Sector Entities Face Cybersecurity Budget Crunches in 2016

A few weeks ago, we came across an article in CIO magazine announcing that the National Association of State CIOs (NASCIO), a trade group representing Chief Information Officers of U.S. states, plans to ask Congress for help with cybersecurity and regulatory issues this year. Specifically, NASCIO wants the Department of Homeland Security to reinforce its state-level cyber programs. Given media reports about the vulnerability of our nation’s infrastructure and concerns about state (as well as [...]

2016-02-02T14:20:26-05:00February 2, 2016|

Avoiding the Email Hacks that Catch the “Big Boys”

This year has seen more spectacular hacks, including the email hacks of CIA Director John Brennan as well as the voice mail hack of Department of Homeland Security Secretary Jeh Johnson. When high-profile individuals involved in national security become victims themselves, it makes everyone wonder, “Is anyone safe?” For organizations trying to protect their corporate assets and the sensitive information of their employees and customers, the answer is, “Yes, and No.” According to published reports, [...]

2016-12-21T05:37:23-05:00December 10, 2015|

Why Cyber-Extortion Is Now Everyone’s Problem

Cyber-extortion, where criminals gain control of company assets through the Internet, isn’t a new phenomenon. For more than a decade, perpetrators have been using ransomware – malware that restricts access to infected machines until the owners pay a ransom – to extort money from businesses. However, the practice of cyber-extortion has taken some grisly new turns, most recently in the data breach of British telecommunications firm TalkTalk. Hackers breached the TalkTalk website and stole millions [...]

2016-12-21T05:37:23-05:00November 19, 2015|