Always be Prepared: Monitor, Analyze and Test your Security

By Michelle Drolet . 11 Oct 2016

Stay vigilant, plan your response and test your defenses with CIS Controls 18, 19 and 20   This is the final entry in our series on the 20 Critical Security Controls devised by the Center for Internet Security (CIS) as best practices to help the public and private sectors tighten their cybersecurity. We started down … Continue reading Always be Prepared: Monitor, Analyze and Test your Security

8 Tips to Secure Those IoT Devices

By Michelle Drolet . 20 Jun 2016

Make sure the Internet of Things isn’t a route for hackers to get into your home or workplace   As more and more Internet-connected devices find their way into our homes and businesses, it’s important to remember that they represent a security risk. The Internet of Things (IoT) is growing rapidly, and in the rush … Continue reading 8 Tips to Secure Those IoT Devices

Hundreds of cloud apps still vulnerable to DROWN

By Michelle Drolet . 22 Mar 2016

Complacency in addressing known vulnerabilities puts users at risk   If you have even a passing interest in security vulnerabilities, there’s no chance that you missed the news about the DROWN vulnerability. It’s one of the biggest vulnerabilities to hit since Heartbleed, potentially impacting a third of all HTTPS websites. By exploiting the obsolete SSLv2 … Continue reading Hundreds of cloud apps still vulnerable to DROWN

5 cybersecurity trends to watch for in 2016

By Michelle Drolet . 4 Feb 2016

As threats evolve and grow more sophisticated, securing IT systems is more important than ever.   We may welcome in the New Year with open arms, but we must also prepare for the cybersecurity threats ahead of us. The 2015 Cost of Data Breach Study from IBM and the Ponemon Institute put the average cost … Continue reading 5 cybersecurity trends to watch for in 2016

Applying more Critical Security Controls to your organization

By Michelle Drolet . 4 Dec 2015

The last time we looked at how Critical Security Controls (CSC) can help you build your InfoSec framework, we covered getting a handle on your software and your hardware inventories. Today, we’re going to discuss the importance of continually assessing and remediating vulnerabilities, keeping a tight control of administrative privileges, and monitoring your audit logs. … Continue reading Applying more Critical Security Controls to your organization

‘Get Smart’ when it comes to using cloud-based services for file sharing

By Michelle Drolet . 10 Sep 2015

Encrypting data on your own might be the smartest move.   For those of you old enough to remember the TV comedy series “Get Smart” featuring a spy that used his shoe for a phone, the good guys belonged to an agency called “Control,” and the bad guys were affiliated with “Chaos.” This month “Get … Continue reading ‘Get Smart’ when it comes to using cloud-based services for file sharing

Google running late to the enterprise mobility party

By Michelle Drolet . 28 May 2015

Is Android secure enough for the enterprise? Android has a bad reputation when it comes to security, which is unfortunate because it’s the biggest mobile platform around in terms of market share. Gartner says Android claimed 80.7% of the worldwide smartphone market in 2014. We know that the BYOD trend has sparked a dramatic rise in personal mobile … Continue reading Google running late to the enterprise mobility party

Tags