I recently saw an article that said – “Want to enhance your cyber security and privacy? …here are more than 50 free tools to help you.” I love the idea of having some open-source or free tools…but what concerns me is having a need for so many tools. AV and Endpoint security SIEM Security Information…

Read More

We authored a blog on Win7 back in 2016…it was on end of sale of the popular OS. Arguably, one of the most popular operating systems of all time, certainly Microsoft’s most popular…or was. One that has lasted even longer than Microsoft expected…GA – generally available in October 2009, Microsoft has announced the end of…

Read More

Why is it important? What are the risks? How do we build that culture?  The reason that IT security is important is twofold. First of all, more data is being kept electronically/digitally vs. keeping hard copies. As a result, more information is being kept in this format because it is easy. Plus, the second reason…

Read More

Whaling is big business. No…this is not a Greenpeace initiative – it is not killing giant mammals of the sea for their blubber and meat. This is whaling attacks that are a form of phishing aimed at senior corporate executives, who have access to loads of valuable information. The bad guys are trying to steal…

Read More

In a news report it was revealed that up to 1 billion passwords have been compromised. As an IT professional we know to do. Quickly either delete the affected account or change the password. And if we use the same password or naming convention, all other accounts we have get changed too. Even with the…

Read More

I recently read an article about the NSA getting hacked. A group called Shadow Brokers claimed they hacked Equation Group (and based on the story I read, Equation Group is an NSA entity). The article went on to say that the group published what it claims are sophisticated software tools (cyber weapons) and posted that…

Read More

At one time or another, almost everyone has been infected with Malware or Viruses. The telltale signs are a slower responding PC, Popups, Blue Screen, Browser home page is odd or unknown hard drive activity. And any PC on a network has the potential risk of sharing that Malware.  So what are the best strategies to…

Read More

Not the sexiest of topics, but one that could potentially save your bacon. With all the security issues that have been in the news recently, network segmentation is another means of improving your security posture plus can have a secondary impact of improving performance. The growth of a network can sneak up on you. Everything…

Read More

We talk to companies about backup and data protection all the time. We also talk about archiving too… and many times there are questions about the two. Confusion is not the right word, but looking at archiving from a different perspective can be enlightening. Based on some of the conversations we have had with clients,…

Read More

It seems like every week there are security events being reported. Big and small companies alike. And across all types of business – financial services, healthcare, retail, government, media & entertainment and education. Security, specifically cyber-security has become uber important. So as a company, what should we do? What is prudent and responsible? What is…

Read More