Blog Posts

Why you shouldn’t be managing your own SIEM

As IT continues to grow more complex, managing security through Security Information and Event Management (SIEM) continues to become more important. Threat detection, operational support, and compliance all become more manageable with coordinated SIEM. But should you...

The Reddit Breach: You Need Two-Factor Authentication

Last month, the world’s fourth most popular social media site was attacked and successfully breached by an unknown hacker. Having recently surpassed Twitter by the number of active users, Reddit.com is the fourth most popular social media platform, and the most recent...

Cybersecurity is imperative for companies of all sizes

Whether your business is large or small, it’s always necessary to keep your data secure. There are a lot of companies out there that don’t think they need a security team because they only have 40 employees and trust every one of them. Well, they may trust their...

The Weakest Link

Alexander Pope once said, “To err is human; to forgive, divine”. Clearly, Pope never had to deal with being a CISO and having an employee fall victim to a phishing attack. Companies continue to update their digital fortresses to keep out intruders or cyberattacks....

The Dangers of Password Walking

The term “password walking” refers to passwords formed from keys located close to each other on a keyboard. Many people use passwords like this because they are convenient to enter and remember. But these types of passwords, while they provide some protection, are far...

The Customer Experience

The importance of the customer experience in an industry that is not typically known for its warmer customer focus is the reason why former Dell CIO, Jerry Gregoire, called the customer experience “the next competitive battleground.” There are a number of reasons why...

Securing your iCloud

As the popularity and use of Apple’s technologies increase, the importance of iCloud security increases as well. The iCloud is a cloud computing service that allows users to store data such as documents, photos, and audio on remote servers for download to other...

Malicious Apps and How to Protect Your Data

Smart phones have been rising steadily in popularity, and are now used to access the internet more often than desktop computers. Android has become the most popular operating system in use worldwide. Hackers are aware of its popularity, of course, so naturally more...