Quantcast
Channel: Security Best Practices – VioPoint
Browsing latest articles
Browse All 85 View Live

THOSE DAMN USERS!

Everyone in IT knows that all the problems we deal with is because of the users.  I’ve heard many times, “My job would be so much easier if it wasn’t for those damn users!”  While it is true they cause...

View Article



Cyber Insurance Policies: Are They Worth the Cost?

As organizations accumulate, maintain and store an ever increasing amount of personal, financial and healthcare data, opportunities for attackers to carry out data breaches has increased significantly....

View Article

Ups And Downs

Heartbleed, Shellshock, BEAST, POODLE, DROWN, Badlock; These vulnerabilities have received names due to their “supposed” level of impact.  However, are these named vulnerabilities severe and do they...

View Article

Security Breach – Toxic Waste of the Information Age

Information security is still in its infancy as companies scramble to put together competent teams to defend against the growing threat of a security breach. In a way, companies find themselves at a...

View Article

How Valuable Is Asset Identification & Management?

As a long time veteran of the I.T. industry and as a security consultant I’m continually surprised at how difficult it is for businesses to create and maintain a well-documented asset inventory. A...

View Article


Cyber Payment Fraud: A Layered Security Approach

When it comes to preventing cyber payment fraud, traditional security controls are proving to be insufficient.  Cyber criminals are becoming more sophisticated.  Three decades ago, paper check fraud...

View Article

Ransomware: Prevention Now Will Save Panic Later

Your organization has just made a startling discovery.  They have been the victim of a ransomware attack and are now facing the challenge of what to do about it.   Moreover, you discover that your...

View Article

Companies Struggling with Network Security Monitoring

Earlier this year a report released by the Ponemon Institute indicated that four out of five businesses lack the required infrastructure and/or security resources with the proper skills required to...

View Article


What I have learned in my first year of Cyber Security: Part Two- Projects &...

I hope everyone that had a chance to read my part one blog enjoyed it and gained a little extra knowledge. As I mentioned, part two is going to be focused on the difference between projects and...

View Article


Asset Identification and Valuation

When discussing security and security strategy with clients the topic of risk is usually not far behind. There is always lots of discussion about risk methodologies, annualized loss expectancy (A.L.E.)...

View Article
Browsing latest articles
Browse All 85 View Live




Latest Images