How Does Ransomware Work and What Technologies Best Prevent It?

By Steve Brown | February 15, 2018

How Does Ransomware Work and What Technologies Best Prevent It

Ransomware has quickly become one of the most troublesome issues that businesses deal with nowadays. Globally, ransomware is expected to have cost organizations over $5 billion in 2017 with no signs of slowing down.

Read More >

Creating an IT Security Strategy

By Pam Newey | February 8, 2018

Creating an IT Security Strategy

Editor’s note: This article is an excerpt from the Essential Guide to IT Security Strategy.

Businesses in the digital age can no longer rely on disconnected security tools, alongside robust protocols and policies, to avoid increasing IT security threats. The development of a proactive and multidimensional strategy for securing data and your organization’s IT infrastructure is built on well-developed security policies, and overall strategy. However, the first step toward developing that security strategy is to conduct a thorough and in-depth threat assessment.

Read More >

Patch Management Best Practices for Critical Vulnerabilities

By Steve Brown | January 18, 2018

Patch Management Best Practices for Critical Vulnerabilities

With the recent Spectre and Meltdown flaws sending a wave of disruption across IT and all business communities, the scope of the problem continues to unfold. Either one or both of the flaws are present in Intel chips from the last 15 years embedded in countless processors running PCs, servers, and phones.

Read More >

4 Security Risks of Shadow IT

By Scott Whittier | January 11, 2018

According to Gartner’s Top 10 Cloud Security Predictions, by the year 2020, a third of all successful attacks on businesses will be against their shadow IT resources. Businesses can no longer ignore the risks of shadow IT and must take preventative steps against it.

Read More >

5 Types of IT Security Threats Facing Businesses

By Steven Baker | December 7, 2017

According to the Verizon 2017 Data Breach Investigations Report, 51 percent of breaches included some form of malware. While malware in all of its forms is a pervasive threat, what most businesses should be focusing on is that there are numerous cyber threats that they need to guard against.

Read More >

Why Should Your Organization Choose Hybrid Cloud Computing?

By J. Bendonis | November 9, 2017

Gartner, Inc. predicts that, by 2020, 90 percent of organizations will adopt hybrid infrastructure management. That isn’t a surprising prediction; a hybrid environment can optimize systems based on their unique requirements, which accelerates the delivery of services and applications.

Read More >

5 Ways to Overcome IT Security Threats

By Jason Pinardi | November 2, 2017

Cybersecurity has become a frequently used term in business these days.

Whether you hear it in the news or in a meeting, most people are aware that businesses everywhere, and every size, are being targeted by cyber criminals. Just recently companies such as Equifax, Netflix, Sonic, and Yahoo! found their names in the headlines as the latest victims. However, the smaller companies that are also victims hardly get a mention even though they account for 43 percent of all incidents, which cost them an average of $879,582 in damages.  

Read More >

Preventing Malware: WSUS vs. SCCM

By Scott Whittier | October 12, 2017

The Microsoft Windows Security Blog recently made it clear that WannaCrypt ransomware was leaving systems vulnerable to infiltration because of poor patch management. Despite this often-repeated truth, far too many organizations are still leaving vulnerabilities that fall short of preventing malware.

Read More >

How to protect your company from an Equifax type security breach

By Steven Baker | October 11, 2017

Last week, the former CEO of Equifax testified in front of the house energy and commerce committee regarding the massive data breach that his company fell victim to earlier this year. This breach caused the exposure of approximately 143 million U.S. consumers personal and financial information.

In his testimony, Richard Smith explained that the breach was caused by the failure of a single individual to properly communicate and act on a patch to a critical vulnerability.

“Both the human deployment of the patch and the scanning deployment did not work,” Smith told Congress. “The protocol was followed.”

Read More >

How Does Ransomware Work and How Can You Best Prepare for an Attack?

By Jason Pinardi | October 5, 2017

It’s hard to read the news nowadays without seeing some organization falling victim to a ransomware attack.

How does ransomware work? To put it simply: Ransomware is a form of cyber extortion. When a computer is infected, all of the files on the computer are encrypted. Instructions for how to pay the ransom, and the amount to pay, are displayed on the screen. When the victim pays up, they receive a decryption key that will unlock the files so they can access them once again.

Read More >
COMMENTS
Request a One Hour Security Vulnerability Assessment
For a limited time Rutter Networking Technologies is offering a free, no strings attached, one hour consultation with one of our experts for your IT security roadmap needs.
Request Consultation