Kerio Control upgrades VPN encryption

Is the Internet of Things putting your business at risk? The Internet of Things (IoT) isn’t only about cool consumer technologies such as Alexa-controlled light bulbs and Internet-accessible washing machines. Companies have embraced IoT in a big way, using it to gather information from a multiplicity of sources that enable better business decisions and enhance […]

Continue reading

Data Held Hostage: The Ransomware Epidemic

Ransomware has been a constant cyberthreat since the early 2000s, although the first acknowledged instance was as early as 1989 when a file-encrypting Trojan was distributed on compromised diskettes, coupled with demands for a $189 payment. If you thought ransomware was a threat that only impacts technophobic grandmothers, reckless teenagers, and other home computer users, […]

Continue reading

California Consumer Privacy Act Looms Large

The U.S. doesn’t have a federal comprehensive privacy law like the European Union’s General Data Protection Regulation (GDPR), but the legislatures in individual states have been moving to fill in the gaps by passing their own statutes to provide privacy protections to their residents. California’s Consumer Privacy Act (the CCPA) is at the forefront of […]

Continue reading

November 2019 – Microsoft Patch Tuesday

November is bringing arctic winds to many parts of the United States, but as we sit and shiver and try to stay warm (and in my case, dream of the sunny Caribbean islands where I’ll be sailing later in the month), the hackers keep on hacking and the attackers keep on attacking, exploiting whatever vulnerabilities […]

Continue reading

Attacks on DNS hit us where it hurts

The Domain Name System (DNS) is a part of the Internet that the typical business or individual computer user rarely thinks about. Many whose everyday work depends on it don’t even know it exists, and even some IT pros don’t really understand how it works. But without it, we would all have to memorize a myriad […]

Continue reading

Compliance Matters: Data identification and classification

Compliance is all about adhering to regulations established by governments and industries. The main focus of those regulations as they pertain to IT professionals can be summed up in one word: privacy.  Most of our compliance efforts are directed at protecting the privacy of personal identifiable data coming through our networks, stored on our systems, […]

Continue reading

October 2019  – Microsoft Patch Tuesday 

October is here and fall is in the air, even in Texas. Temperature dropped this past week from highs in the 90s to lows in the 50s (Fahrenheit). The state fair is in full swing here, and the stores are full of Halloween decorations. But to us IT security folks, ghosts and goblins aren’t nearly […]

Continue reading

The Spyware That Didn’t Come in from the Cold

Who doesn’t love a good spy thriller?  From James Bond to Jason Bourne, the espionage fiction genre has been a favorite of readers and movie-goers since the 1800s. It’s all fun and games until you find yourself in the middle of your own private spy story as the person (or company) that’s the victim of […]

Continue reading

Third Party Patch Roundup  – September 2019

September signals the real end of summer and beginning of autumn. The changing of the seasons here in Texas brings some relief from the heat. It also traditionally brings some tumultuous weather events such as hurricanes, and this September was no exception. On the IT security front, there was plenty of turbulence as well. Malware […]

Continue reading

Compliance in the cloud: It’s a team effort

Ensuring that your organization is compliant with a plethora of regulations that seem to change and grow on a daily basis is enough of a challenge when all your data is stored and processing is done in your on-premises data center, but when (mostly likely not “if”) you move some or all of your resources […]

Continue reading