<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">

Defrag This | security

Posted on 10.05.17 by Michael O'Dwyer

When Employers Truly Get Under Your Skin

Why would an employer consider biometric microchips for employees? 

Posted on 10.03.17 by Kevin Conklin

10 hacks for Safer Cyber Citizenship

Chances are cyber criminal already have all your personal data. Now is the time to up your game with this series of 10 Hacks for Safer Cyber Citizenship.

Posted on 10.02.17 by Kevin Conklin

UK Data Protection Bill 2017 - Cordery Compliance Video

Our friends at Cordery Compliance have just issued their latest in a series of videos concerning the upcoming GDPR and the UK's Data Protection Bill 2017 and it is well worth the watch. 

Posted on 09.28.17 by Monica Gupta

MOVEit Secure File Transfer: 3 Deployment Methods

Each MOVEit deployment option promises to securely transfer your sensitive data from point A to point B. While one option isn’t better than the others, one may fit you best.

Posted on 09.27.17 by Kevin Conklin

Go Phish... With Your End Users

The intelligence collected from end-user “informants” allows IT to find malware and identify phishing threats more quickly.

Posted on 09.19.17 by Kevin Howell

Casino Security and the IoT

The IoT presents unique security challenges that enterprises will have to solve fast. 

Posted on 09.18.17 by Greg Mooney

CCleaner Supply Chain Attack Exposes Millions of Windows Users

There is a growing trend in the hacker community of compromising the update process of programs we deem safe. The latest example is a supply chain attack on CCleaner.

Posted on 09.14.17 by Greg Mooney

Virtual Patching: An Immediate Response To Zero-Day Exploits

Permanent patches sometimes take months to deploy—leaving digital assets open to attack. That's where virtual patching comes into play.

Posted on 09.13.17 by Monica Gupta

New York Cyber Security Regulation Now In Effect

The New York Cyber Security Regulation is now in effect as of August 28th, 2017. If you are a financial institution, you need to comply.

Posted on 09.12.17 by Alex Jablokow

Was That Always There? A Hardware Keylogger Threat

A hardware keylogger can be installed by anyone with access to the space and the nerve to do it.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.