Blog

Blog

What is IPSEC? - Internet Protocol Security Explained

What is IPSEC?In the world of VPNs, there are typically two types that an organization can choose from, IPSEC or OpenSSL. While many people have migrated to OpenSSL mode because of its new relative ease of deployment, there are still companies that deploy IPSEC-based VPNs because of the additional layers of security they provide that are not available in OpenSSL-based VPNs.Why Choose an IPSEC VPN...
Blog

What is PCI Compliance? Requirements & Checklist | Fortra

PCI Compliance is adherence to the set of ground rules set forth in the Payment Card Industry Data Security Standard (PCI-DSS). The standard defines how vendors who accept credit cards are to manage not only the credit card data, but their own networks as well, to ensure that the card data stays protected from theft and abuse.Who Developed The PCI-DSS?The PCI-DSS was developed by the Payment Card...
Blog

What is a Rootkit and How do you Detect Them?

Rootkits – When Bad Turns to UglyFew words strike more fear into the heart of IT administrators than rootkit. Once a rootkit has been discovered, it’s usually a strong indicator that one or more systems on a network have been compromised and that any data being stored on those systems is now suspect or even worse, has been captured by the rootkit attacker to be released “into the wild” of the...
Blog

Anti Malware Software Program - What is it?

Anti Malware – A New Type of ProtectionIn today’s world, everyone has heard of antivirus software. This is the same software that has been around for a decade or more that protects computers from infection from viruses and other types of malicious software.However, over the last few years the threat landscape has evolved to the point where having anti-virus software on your computer is not enough....
Blog

Meet the latest EPMS requirements — and boost your data security strategy

Have you updated your agency to the Email Protective Marking Standard (EPMS) version 2018.2? As you likely know, changes to the standard went into effect 1 January 2019. Since the last iteration was released in 2010, the EPMS standard has been amended. The changes include updates to the range of security classifications, changes to specific markings and caveat types, as well as new language used...
Blog

Airline Facing Record Breaking $229 Million GDPR Fine

One of the largest airlines in the world is facing a record fine, $229 million, following what the UK's privacy watchdog alleges is a violation of the European Union’s General Data Protection Regulation (GDPR).The U.K. Information Commissioner’s Office (ICO) announced its intention to fine the airline, British Airways, on Monday in an announcement to the London Stock Exchange. The fine, £183.39m,...
Blog

How to Answer Key Capacity Planning Strategy Questions

Anyone who works for a large organization knows that July isn’t just a time for fireworks and BBQs. It’s also when you plan your budget for the next fiscal year. If you work in IT, you know you’re always expected to have an answer for everything. But when it comes to planning your budget, there are really only two questions that need to be asked. Do you have enough resources on hand for the...
Vulnerability Research

BlueKeep Vulnerability – Patch Now, Patch Again

With the May 2019 Patch Tuesday release from Microsoft, it was revealed a number of older Microsoft operating systems are vulnerable to a condition known as BlueKeep (CVE-2019-0708). BlueKeep is a Remote Code Execution (RCE) flaw in Remote Desktop Services (RDS)/Remote Desktop Protocol (RDP) allowing code to run with system level access and is potentially “wormable” making it possible for an...
Blog

MSSPs Need the Industry to Evolve to Offer Multi-Tenant Vulnerability Management Solutions for Today’s Dynamic Environments

According to the Verizon Data Breach Investigations Report, published in November 2018, the #1 cause of a breach continues to be vulnerable systems left exposed and unpatched. Preventing the exploitation of vulnerabilities when using an effective solution is one of the few countermeasures that can pro-actively protect your infrastructure before an attack has even started as opposed to relying on...
Blog

Nevada Beats California With New Privacy Law

Nevada's new law, which will require website operators to honor opt-out procedures, goes into effect on October 1, three months before the CCPA's compliance deadline, January 1, 2020.
Blog

The True Cost of Workload-Related Outages

Underestimating the consequences of downtime can be hugely detrimental to your productivity. Accurately calculating those costs won’t just prevent disasters, but also help you effectively manage your capacity planning efforts.
Blog

What is Capacity Planning?

What is Capacity Planning? IT capacity planning is a process used to manage IT service delivery. Business services depend on IT resources in most organizations. Retail organizations need IT to make sure their POS system stays up and running – even on days with unusually high transaction counts, like Black Friday. Banks and other financial services providers...