<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

security

Posted on 12.10.19 by Jeff Edwards

Avast CCleaner Hit by Another Attack: What's the Issue?

It's happened again, the Avast CCleaner application has been hit by another supply chain attack. This most recent supply chain attack should serve as an important security reminder for everyone.

Posted on 12.09.19 by Michael O'Dwyer

A VPN is NOT A Security Tool! It's in the Name

 

Some may argue that VPNs enhance security (encrypted connections etc.) but their core aim is privacy – it’s in the name – virtual private network.

Posted on 12.04.19 by Greg Mooney

Nine Holiday Security Tips for E-Commerce Retailers

The holidays just might be “the most wonderful time of the year” as the old-time carol says. But for IT security teams that oversee e-commerce websites, the holidays can also be “the scariest time of the year.”

Posted on 11.27.19 by Dan Franciscus

Using Powershell Authenticode Certificates to Self-Sign Application

One of the best ways to protect your servers and workstations from malware is to limit the execution of untrusted files.

Posted on 11.25.19 by Michael O'Dwyer

Who is to Blame in Wake of a Data Breach?

We like to assign blame. It seems it’s human nature to be totally knowledgeable in areas that don’t involve us at all.

Posted on 11.20.19 by Greg Mooney

Is Cyber Insurance Worth the Cost?

Another way to ask this question is, “Do you like to gamble?” That’s usually what the decision to purchase any type of optional insurance comes down to. It’s no different for cyber insurance, which every size business needs to consider.

Posted on 11.04.19 by Jeff Edwards

AS2 vs. SFTP: Which is Best for You?

There are lots of file transfer protocols to choose from, but one that’s rarely discussed in depth is AS2. In this article, we take a deeper look at AS2, how it stacks up against SFTP, and why you would choose one or the other.

Posted on 10.30.19 by Michael O'Dwyer

Forensic Certification: GNFA

Why is the GNFA relevant? What are the benefits to companies and to certified GNFA professionals?

Posted on 10.25.19 by Jeff Edwards

Why Retailers Are a Soft Targets to Hackers (And What to Do About it)

Time and time again, retailers prove to be a popular (and easy) target for hackers. The tangible and intangible costs for an e-commerce site that’s been breached can escalate quickly. In this post, we'll explore the issue, and outline some solutions. 

Posted on 10.21.19 by Michael O'Dwyer

4 Ways to Rescue Your Rep After You've Been Hacked

I’d like to believe that all readers will use this post to prepare for a ‘what if’ scenario but the sad truth is that some of you are reacting to a data breach and lack an incident response plan.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.