<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2923012&amp;fmt=gif">

How to Conduct a Security Vulnerability Assessment

Companies often conduct a security vulnerability assessment when they come to the realization that they are not where they need to be when it comes to securing their computer network and/or technology resources. Typically, the vulnerability assessment results in a prioritized list of found vulnerabilities and the methods that the business needs to use in order to remediate them. But just how do you go about coming up with that list?

Read More

Making the Case for Software Defined Networking and Security


In the world of virtualization, there are many inherent security features that come with a virtual environment natively, but with the rise of Software Defined Networking (SDN), we have a new layer of security which can be easily added to any virtual environment.  SDN strips away the traditional boundaries of IT security and brings them directly to the guest virtual machine.  Through a concept referred to as Micro Segmentation, a central next generation firewall policy can be defined at the interface level of the virtual machine, effectively plugging each server in your environment directly into a firewall, providing protection, both inbound and outbound for all traffic to and from that host.

Read More

4 Types of Security Threats That Can Affect Your New England Business

Businesses are taking security and security threats more seriously than ever before. If you look at some of the recent statistics about losses and data breaches, it is easy to understand why:

Read More

Why a Security Roadmap Is Essential for Small-Business IT Support

 

According to Symantec’s 2016 Internet Security Threat Report , 43 percent of cyber attacks target small businesses. That increasing percentage is due to the fact that so many small businesses are easy targets, as they lack the necessary tools and policies, as well as the comprehensive security roadmap, to guide them.

Read More

Join Rutter at the Check Point 300 Unknown Roadshow!

Rutter will be at the Unknown 300 Roadshow on February 2nd from 8:30 AM- 12:00 PM at The Liberty Hotel in Boston. Please join us to learn how Check Point is handling ever-changing cyber threats, and the unprecedented growth from unknown malware. There were over 300 malicious files scanned through Check Point’s Threat Emulation and other competing products.  The results found that Check Point out performed all of the others.

Read More

Assessing your BCDR plan

 Having a well thought out BCDR plan today has become an overlooked business necessity and major pain point. Knowing that your data and information is being properly backed up in the event of an accident or disaster is crucial to any IT department. What would happen to your company and your critical data in the event of a disaster such as a fire or flood? Would you lose business-critical information? These unforeseen disasters often leave companies crippled due to data loss.

Read More

Identity Management: The Rutter Solution

One of the common questions that arises in the IT industry today, what is Identity Management? Identity Management (IDM) is having governance or policy over who has access to what information out of your existing users.  The old way of giving users within your environment access to certain servers, files, etc. was on an as-need and individual basis. Applying governance on an individual basis meant an IT resource would manually have to provision rights for users. As technologies in companies swell, the likelihood of mistakes using a manual process would only increase with time. This is not only time consuming, but hard to manage. It also introduced points of vulnerability in guaranteeing compliance with standards such as HIPPA, Sarbanes Oxley and so on.

Read More

1st #RNTChat -- August 22nd at 1PM -- Mobile Device Management (MDM)

How many ‘smart’ devices do you own? A Smart Phone? A Tablet? A Laptop? An e-reader? If you’re like most people, the answer is all of the above. As devices have become smaller, versatile, and more affordable it’s not all that uncommon for people that own these devices to use them both at home and in the workplace. However, this industry trend does not come without security ramifications, having more devices increases the need for the security and management.  A lost Smart Phone or tablet could put your personal and business data at risk and expose sensitive information to unauthorized individuals.

Read More