Blog
How Organizations Can Stay Ahead of Changing Privacy Laws
By Cybersecurity Experts at Fortra on Thu, 08/22/2019
GDPR, CCPA, PIPEDA. Privacy legislation is constantly changing these days. We asked 26 business leaders, security pros, and attorneys how to best stay ahead of changing privacy laws.
Blog
The Importance of Network Monitoring in the Internet of Medical Things (IoMT)
Wed, 08/21/2019
Learn why network monitoring software is critical for the Internet of Medical Things (IoMT) and keeping healthcare facilities and hospital networks healthy.
Blog
Data Classification: The 5 Steps to Effectively Classify Your Data
Fri, 08/09/2019
A corporate data security policy that sets out how valuable information should be handled will be ineffective unless it’s consistently and accurately enforced. Organizations often have a written policy that’s available on their company intranet and handed to new starters. In practice, however, employees are rarely sure how to apply it to their daily...
Blog
Types of Cyber Threats
Thu, 08/08/2019
What are Cyber Threats?A cyber threat is basically any type of threat that is computer related in nature. To be clear, a computer could be a desktop computer, a laptop, a tablet or even a smartphone. All of these devices have particular types of threats that they can be exposed to that users need to be aware of to ensure that they can protect themselves and their confidential information.Types...
Blog
Benefits of Network Monitoring in Healthcare
By Kevin Jackson on Thu, 08/08/2019
In the world of healthcare, keeping your network healthy is critical to keeping patients healthy. With Intermapper, you can maintain a more secure IT infrastructure that allows you to deliver better care to patients.
Blog
4 Strategies to Enhance Both your Security and Compliance Posture
Thu, 08/01/2019
Running a comprehensive and cost-efficient compliance program whether HIPAA, NIST, FFIEC, PCI, GDPR, or Sarbanes Oxley (to mention a few) is a major headache for most Compliance Teams. Digital Defense offers industry leading vulnerability management and assessment, along with best practice compliance guidance to organizations across all verticals and sizes.With predictions from a recent survey by...
Blog
Microsoft is Right, Mandatory Password Changes are Obsolete
Thu, 08/01/2019
This article was originally published on Help Net Security on August 1 , 2019.Microsoft has recently come out and said that mandatory password changing is ancient and obsolete. This goes directly against everything we were trained to think for the last couple of decades, and against most compliance directives including some of the most dominant security standards. And it is correct.If anything,...
Blog
What is IPSEC? - Internet Protocol Security Explained
Thu, 07/25/2019
What is IPSEC?In the world of VPNs, there are typically two types that an organization can choose from, IPSEC or OpenSSL. While many people have migrated to OpenSSL mode because of its new relative ease of deployment, there are still companies that deploy IPSEC-based VPNs because of the additional layers of security they provide that are not available in OpenSSL-based VPNs.Why Choose an IPSEC VPN...
Blog
Equifax to Pay Upwards of $700 Million in Data Breach Settlement
By Cybersecurity Experts at Fortra on Mon, 07/22/2019
Once approved, the settlement will be the largest ever paid by a company over a data breach.
Blog
What is PCI Compliance? Requirements & Checklist | Fortra
Fri, 07/19/2019
PCI Compliance is adherence to the set of ground rules set forth in the Payment Card Industry Data Security Standard (PCI-DSS). The standard defines how vendors who accept credit cards are to manage not only the credit card data, but their own networks as well, to ensure that the card data stays protected from theft and abuse.Who Developed The PCI-DSS?The PCI-DSS was developed by the Payment Card...
Blog
What is USB Control & Encryption?
Tue, 07/16/2019
Learn about USB control & encryption in Data Protection 101, our series that covers the fundamentals of data security.
Blog
What is a Rootkit and How do you Detect Them?
Wed, 07/10/2019
Rootkits – When Bad Turns to UglyFew words strike more fear into the heart of IT administrators than rootkit. Once a rootkit has been discovered, it’s usually a strong indicator that one or more systems on a network have been compromised and that any data being stored on those systems is now suspect or even worse, has been captured by the rootkit attacker to be released “into the wild” of the...
Blog
Anti Malware Software Program - What is it?
By Mieng Lim on Tue, 07/09/2019
Anti Malware – A New Type of ProtectionIn today’s world, everyone has heard of antivirus software. This is the same software that has been around for a decade or more that protects computers from infection from viruses and other types of malicious software.However, over the last few years the threat landscape has evolved to the point where having anti-virus software on your computer is not enough....
Blog
Hotel Chain Fined $123 Million in Second Major GDPR Fine of Week
Tue, 07/09/2019
The massive fine comes one day after the ICO's fine of British Airways.
Blog
Meet the latest EPMS requirements — and boost your data security strategy
Tue, 07/09/2019
Have you updated your agency to the Email Protective Marking Standard (EPMS) version 2018.2? As you likely know, changes to the standard went into effect 1 January 2019.
Since the last iteration was released in 2010, the EPMS standard has been amended. The changes include updates to the range of security classifications, changes to specific markings and caveat types, as well as new language used...
Blog
Airline Facing Record Breaking $229 Million GDPR Fine
By Cybersecurity Experts at Fortra on Mon, 07/08/2019
One of the largest airlines in the world is facing a record fine, $229 million, following what the UK's privacy watchdog alleges is a violation of the European Union’s General Data Protection Regulation (GDPR).The U.K. Information Commissioner’s Office (ICO) announced its intention to fine the airline, British Airways, on Monday in an announcement to the London Stock Exchange. The fine, £183.39m,...
Blog
How to Improve IT Efficiency: 3 Strategies to Keep Services Up and Costs Down
By Per Bauer on Wed, 06/26/2019
Blog
How to Answer Key Capacity Planning Strategy Questions
Fri, 06/21/2019
Anyone who works for a large organization knows that July isn’t just a time for fireworks and BBQs. It’s also when you plan your budget for the next fiscal year.
If you work in IT, you know you’re always expected to have an answer for everything. But when it comes to planning your budget, there are really only two questions that need to be asked.
Do you have enough resources on hand for the...
Vulnerability Research
BlueKeep Vulnerability – Patch Now, Patch Again
Wed, 06/19/2019
With the May 2019 Patch Tuesday release from Microsoft, it was revealed a number of older Microsoft operating systems are vulnerable to a condition known as BlueKeep (CVE-2019-0708). BlueKeep is a Remote Code Execution (RCE) flaw in Remote Desktop Services (RDS)/Remote Desktop Protocol (RDP) allowing code to run with system level access and is potentially “wormable” making it possible for an...