Newsletters

New Year’s Security Resolutions It was a year of security breaches and incidents in 2014. The start of this year is good for goals and resolutions, so here is a short list of some security resolutions for 2015. 1. Password Security – This is still one of the most vulnerable parts of your security program. […]

Read More

Most Organizations Have Been Compromised and Don’t Even Know It According to the Cisco 2014 Annual Security Report most businesses have been compromised and they don’t even realize it. In this report, 100% of business networks that Cisco analyzed had traffic going to websites that host malware. Attacks are also taking much longer to detect. […]

Read More

1 Out of Every 10 Smartphone Users in the US is a Victim of Theft Smartphones have been stolen at an alarming rate in the US over the past few years. This should be a concern as more companies are looking to implement BYOD. A study discovered that 1 in 10 smartphone users are victims […]

Read More

Heartbleed Vulnerability This is a very serious vulnerability. If you have not changed your passwords on the various websites that you visit, you should. A vulnerability in the OpenSSL library exposed the ability to obtain certain passwords, and possibly the certificate private key which would allow an attacker to obtain user names and passwords. Sites […]

Read More

ReliableDR for VMWARE Unitrends is a product I have been working with for quite some time. They have just purchased a product called PHD Virtual and it has some exciting features and functions. I believe the most exciting product and feature is ReliableDR for VMWARE. ReliableDR integrates with your SAN provider and leverages SAN snapshots […]

Read More

Cyber-Security Awareness February is known for Valentine’s Day and being the shortest month of the year. Instead, I am going to dedicate the articles in this newsletter to Cyber-Security. Its the second month of 2014 and its time to start thinking about how to secure your computing assets. The attacks are becoming more advanced and […]

Read More

Happy New Year! – Make a New Year Resolution: Schedule Time for a Security Review/Audit Another year has passed and we get to start fresh with a new year. Why not make a New Year’s resolution to have a security review on your network? Why? The attacks these days are getting much more advanced and […]

Read More

Make Sure Your Consultant is Following Standards and Best Practices I’ve had the chance to visit some new clients lately. They have all had some issues that needed to be addressed. These issues were all created by a poorly installed project. While it is hard to find out if the person truly has experience with […]

Read More

Bring your Own Device (BYOD) and the Mobile Revolution – Are You Ready? BYOD is a term that is tossed around quite a bit as of late, as a way to save money or give end users freedom to choose the platform they want to use. Before you believe all of the hype you need […]

Read More

ChromeBooks Google has released a low cost operating system installed on laptops called a Chromebook. The Chromebook has been around for about 2 years, but it seems to be gaining in popularity especially in schools. The Chromebook integrates with Google Apps for Enterprises or Education. You can push certain settings down, and have email and […]

Read More