What are the Threats of Ransomware to the Remote Workforce? PwC’s report Cyber Threats 2022 found ransomware incidents in 2022 made ransomware to be a major cybersecurity threat faced by organizations of many sizes and in many sectors. 1 Threat actors were able to circumvent security measures and successfully infect networks, from manufacturing to retail […]
Category: Outsourced IT
What is VDI? The work landscape has changed dramatically, with employees increasingly working from home and hybrid cloud ecosystems becoming commonplace. As the landscape changes to include more employees working from various locations, on different devices, and within many systems, the challenges of administration and security are growing and changing as well. In order to […]
Business Resilience Planning
What is Business Resilience Planning? Crisis management and business continuity planning is something that your organization may have engaged with quarterly or even annually pre-pandemic, but it is likely to have become significantly more active since then. Before settling back into complacency, thinking that one “black swan” event is all your organization will ever endure- […]
What are Steps to Take for Employee Offboarding? Establishing and following an IT protocol for offboarding employees is a critical, but often overlooked, cybersecurity protection activity. More often than not, an organization cannot predict how/why/when an employee will exit the organization, so having a plan in place that can be applied in any kind of […]
What are IT Security Risks for National Critical Functions? Whether your organization is public or private, it exists within a complex system where it might a greater role and responsibility in national security than you may have realized. The Cybersecurity & Infrastructure Security Agency (CISA) defines National Critical Functions (NCFs) as, “…functions of the government […]
How are Web Applications Securely Coded? As organizations become more mindful of the critical role of cybersecurity in their business, they are increasingly interested in web application development with security at the forefront. A savvy developer with a security mindset will engage in coding practices such as the following recommendations from the Open Web Application […]
What is IT Monitoring? IT monitoring is the process of gathering metrics about the operations of an IT environment’s hardware and software to ensure that the equipment is available and performing to the level expected and necessary to maintain your business. This is achieved by using trends to validate infrastructure updates before applications or services […]
What is Enterprise Network Security? Enterprise network security is the protection of a network that connects the systems, mainframes, and devices within an enterprise. Wireless networks (Wi-Fi) are vulnerable to cyberattacks as they lack many of the robust security tools that secure wired networks, such as firewalls, intrusion protection systems, content filters, and antivirus and […]
What are Security Misconfigurations? Security misconfigurations are a result of security settings not being defined or implemented, and default values are maintained. This typically means that configuration settings do not comply with industry security standards which are critical to maintaining security and reducing risk. Security misconfigurations happen most often when a system administrator or database […]
Security.txt
What is a Security.txt File? Organizations adopt a wide variety of disclosure policies and cybersecurity practices, but these are often a mystery to the security researchers tasked with informing an organization about security vulnerabilities or data leaks. A common scenario is a security researcher finding sensitive information from an organization for sale on the dark […]