<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

security

Posted on 11.20.19 by Greg Mooney

Is Cyber Insurance Worth the Cost?

Another way to ask this question is, “Do you like to gamble?” That’s usually what the decision to purchase any type of optional insurance comes down to. It’s no different for cyber insurance, which every size business needs to consider.

Posted on 11.04.19 by Jeff Edwards

AS2 vs. SFTP: Which is Best for You?

There are lots of file transfer protocols to choose from, but one that’s rarely discussed in depth is AS2. In this article, we take a deeper look at AS2, how it stacks up against SFTP, and why you would choose one or the other.

Posted on 10.30.19 by Michael O'Dwyer

Forensic Certification: GNFA

Why is the GNFA relevant? What are the benefits to companies and to certified GNFA professionals?

Posted on 10.25.19 by Jeff Edwards

Why Retailers Are a Soft Targets to Hackers (And What to Do About it)

Time and time again, retailers prove to be a popular (and easy) target for hackers. The tangible and intangible costs for an e-commerce site that’s been breached can escalate quickly. In this post, we'll explore the issue, and outline some solutions. 

Posted on 10.21.19 by Michael O'Dwyer

4 Ways to Rescue Your Rep After You've Been Hacked

I’d like to believe that all readers will use this post to prepare for a ‘what if’ scenario but the sad truth is that some of you are reacting to a data breach and lack an incident response plan.

Posted on 10.16.19 by Jeff Edwards

PCI DSS Compliance 101: What You Need to Know

If your business deals with credit card payments in any way, then PCI compliance is going to be a fact of life, and an essential part of running your business securely and efficiently. PCI compliance is a critically important step in protecting your customer's or...

Posted on 10.14.19 by Michael O'Dwyer

Do Customers Really Care About Data Breaches?

How much customers care about data breaches is often dependent on the type of customer data obtained by attackers.

Posted on 10.10.19 by Greg Mooney

4 Myths of PCI Compliance

If your organization is finding it difficult to comply with PCI DSS, the Payment Card Industry Data Security Standard, it could be due to some of the misconceptions about the standard.

Posted on 09.27.19 by Michael O'Dwyer

SSL 101: SSL/TLS Certificates And Why You Need Them

Secure Socket Layer (SSL) or Transport Layer Security (TLS) refer to security technologies that encrypt data sent between a web server and web browser.

Posted on 09.18.19 by Michael O'Dwyer

How to Lower the Risk of Employee Data Theft

As IT pros, we’ve been aware for quite some time that some users are a threat to security, whether by their use of shadow IT, their susceptibility to social engineering attacks from cybercriminals, or by using their employee role and access permissions to compromise data...

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.