5 Trends in IT Security Services to Watch for in 2019

IBM’s SecurityIntelligence reported some frightening statistics regarding data breaches in 2018. Although the time it takes to detect a data breach is down from years to 196 days, the cost of a breach has increased. On average, the cost of a compromised record is up to $148. This is tough news for most organizations to deal with, and experts expect the number of records compromised per breach to increase, as well.

These reasons alone make it more important than ever for organizations to stay informed about the latest trends in IT security. Considering the damage that can be done to the reputation of a business that is the victim of cybercrime, you have more reason than ever to understand what the threat landscape looks like for this year.

Read More

Tips To Protect Yourself From Internal Security Threats


Cybersecurity is one of the main business concerns of the 21st century. Consumers, businesses, and employees are all driven by the internet and can access anything at any time. This 24/7 access can cause problems from external sources, such as hackers.

However, internal security threats open an organization to a breach. Here are a few tips for businesses to protect themselves from internal security threats.

Read More

Database Security—Repelling a Breach with Defense-in-Depth

Lily Hay Newman, in a recent article in Wired, pegs “poorly secured databases that connect directly to the internet” as a main culprit for many of today’s mega data breaches. Why? Robust database security offers a defense-in-depth strategy should an attacker breach your perimeter defenses. But if the security measures are left unused, the sensitive data presents an easy target for hackers to go after.

Read More

What Types of Security Threats Do Small Businesses Face?

When it comes to choosing a victim, cybercriminals often look for low-hanging fruit. They seek the path of least resistance to keep their chances of success high and of getting caught low.

This is why so many criminals target small- to medium-sized businesses (SMBs). It is no secret among SMBs that they are frequently targeted by attackers. In fact, a research report from the Better Business Bureau shows that 87 percent of SMBs are aware that they are not safe from cybercrime. Despite this awareness, cyberattacks cost SMBs an average of $2,235,000 in 2017. This means smaller companies are still failing to properly secure their assets.

Read More

We need Log Management!

Yes, you heard that right, the boss said, “We need Log Management!” And he’s right but what does he mean? Isn’t that the horribly complex software that is only needed by huge corporations? And why is he saying it now? Did something happen?

Read More

3 Essential Components of Your IT Security Roadmap

Businesses that lack adequate data security are exceptionally vulnerable to cyberattacks. They’re also are more likely to experience problems associated with mismanaged, unorganized, and insecure data. If you don’t have an IT security plan in the modern age, you’re exposing your business to unnecessary risk and liability. A comprehensive IT security strategy can help you protect your business, your customers, your data, your viability, and your integrity. We’ve laid out three essential components of an IT security roadmap to help you protect your company and plan for the future.

Read More

Two Factor Authentication for Office 365 (Part 2)

From a Microsoft Azure Active Directory perspective, there are two approaches to MFA:

1. A laser accurate approach specific to the application in the Azure blade using conditional access

2. A global approach managed through the “Multi-factor authentication” page via Office 365

Read More

Two Factor Authentication for Office 365 (Part 1)

Password complexity has been touted for some time to prevent identity theft. Especially in an Active Directory environment. Typical password complexity rules in Active Directory are:

  • Uppercase characters of European languages (A through Z, with diacritic marks, Greek and Cyrillic characters)
  • Lowercase characters of European languages (a through z, sharp-s, with diacritic marks, Greek and Cyrillic characters)
  • Base 10 digits (0 through 9)
  • Nonalphanumeric characters: ~!@#$%^&*_-+=`|\(){}[]:;"'<>,.?/
  • Any Unicode character that is categorized as an alphabetic character but is not uppercase or lowercase. This includes Unicode characters from Asian languages.
Read More

AWS Security Best Practices: Decoding the Shared Security Model

Navigating today’s threat landscape and ensuring security in the public cloud is more important than ever. When it comes to AWS security best practices, businesses must start with an understanding of the AWS Shared Responsibility Model. Unfortunately, many companies don’t fully understand that shared model and who is responsible for what,  despite the AWS clear statement:

Read More

How Does Ransomware Work and What Technologies Best Prevent It?

Ransomware has quickly become one of the most troublesome issues that businesses deal with nowadays. Globally, ransomware is expected to have cost organizations over $5 billion in 2017 with no signs of slowing down.

Read More