The NIST Cybersecurity Framework Functions - Protect
by Kyle Daun on April 30, 2018 at 1:34 PM
As promised in last month’s blog about the NIST Cybersecurity Framework Identify function, this month we are discussing the Protect function. After an organization has addressed the five categories within the Identify function (Asset Management (ID.AM), Business Environment (ID.BE), G …
New Version of the Critical Security Controls Released
by Geoff Yeagley on April 25, 2018 at 10:00 AM
Last month, the Center for Internet Security (CIS) released version 7.0 of the Top 20 Critical Security Controls. This represents a significant revision from the previous version (6.1) and introduces some interesting changes. Before we dig into the changes to the controls, if you are …
Online Banking for Businesses – How to protect yourself
by Derek Boczenowski on March 27, 2018 at 9:15 AM
One of the biggest areas that we see attacks on is the business online banking customer. There has been a marked increase in trying to compromise these accounts, primarily to abscond with the funds within the accounts, but also to execute identity theft as well. Many of these attacks …
Urgent Cisco Vulnerability Identified - What You Need To Know!
by Josh McDonald on January 31, 2018 at 12:21 PM
We know security is important to you and it has come to our attention there is a vulnerability affecting the Cisco ASA operating system, specifically the SSL VPN (CVE-2018-0101). The vulnerability allows an attacker to take remote control of the system and is very high risk. This vuln …
Ransomware Examples - Locky is Back and Worse Than Ever!
by Geoff Yeagley on October 5, 2017 at 9:48 AM
For a period of about 18 months, Ransomware dominated the news related to information security. Companies of all sizes and verticals were under attack by cybercriminals that were looking to make a quick buck, or a lot of bucks in some cases. Then, all of the sudden, Ransomware sort of …
Bluetooth Security - What You Need to Know About the BlueBorne Attack
by Geoff Yeagley on September 20, 2017 at 9:00 AM
Think about how much we use Bluetooth daily. Whether we are connecting our smartphones to a wireless speaker, to our car to make handsfree calls or to our Apple Watch, we use Bluetooth on a very frequent basis. In the world of Information Security, the more you use something and the m …