5 Smart Ways to Thwart Login Attacks

December 12, 2019
Just like locking your front door is crucial to protect your house, monitoring account logins to organizational servers and workstations is crucial to detect password cracking attempts. Enhance your security operations to continuously improve visibility and defenses.

Cybercrime Doesn't Take a Holiday

November 19, 2019
The holidays are a busy time for most business owners as they ramp up to serve consumers excited to find holiday specials, or even as they prepare for time away from their businesses to spend time with friends and family. Hackers know that you are distracted from your core duties and normal routine and will look for vulnerabilities in your systems.

Five Things to Consider for Point-of-Sale Cellular Failover Connectivity

October 01, 2019
If a multi-location business is looking for cellular failover connectivity to ensure business continuity in the event of a blackout or brownout of the broadband internet connection, there are quite a few cellular modems out there that would do the basic job. But when looking for a cost-effective solution that is designed specifically for Point-of-Sale (POS) environments, then some important considerations come into play.

7 Steps to Better Website Security for National Cybersecurity Awareness Month

October 01, 2019
Threats and threat actors continue to evolve and morph, creating advanced and even more dangerous tactics to mitigate. October is National Cybersecurity Awareness Month (NCSAM). NSCAM 2019 centers on the theme of Own IT. Secure IT. Protect IT., advocating a proactive approach to enhanced cybersecurity in the workplace and at home.

Is the ELK Stack a SIEM?

September 25, 2019
The ELK (Elasticsearch, Logstash, Kibana) stack is a popular open source log analysis and management platform. The collection, processing, normalization, enhancement, and storage of log data from various sources are grouped under the term “log management.”

Best Practices to Halt Insider Threats

September 13, 2019
While nation-state threat actors and external hackers often garner the headlines, insider threats are an often-overlooked threat vector. Rockwell-Boeing, Anthem Healthcare, and Capital One are just a few organizations with damaging data breaches caused by insiders.

When Digital Transformation Equals Digital Disruption

August 27, 2019
The retail industry has come a long way during the last decade. Online ordering, in-store beacon technology, cloud POS, omnichannel retail platforms, and digital menus and signage, are evidence of innovation taking place. The impact of complacency can seriously damage short-term revenue but also brand reputation and therefore, long-term revenue.

Coordinated Ransomware Attacks Hit Resource-Constrained Municipalities

August 20, 2019
A financially motivated ransomware gang hit 23 local governments in Texas in a coordinated attack. Ransomware is a type of malicious software, often delivered via email or drive-by web downloads, that locks up an organization’s systems until a ransom is paid or files are recovered by other means such as backup restoration.

Black Hat Recap: Cybersecurity Insights That Enhance Security Operations

August 16, 2019
Black Hat 2019 was a learning experience and success for all. All of the hackers, presenters, vendors, and attendees have gone home, but what you learned in Vegas doesn’t have to stay in Vegas. Hopefully you are bringing new information and insights back to your daily operations. Here are some of Netsurion’s key takeaways from Black Hat 2019.

Mitigate Software Supply Chain Attacks with SIEM and EDR

August 08, 2019
At Black Hat 2019, Eric Doerr, GM of the Microsoft Security Response Center, reminded attendees of the interconnectedness of enterprise software supply chains and of their vulnerability to attack. Eric highlighted how supply chain compromises come in many guises

7 Things IT Pros Should Know about HIPAA and Protecting Patient Data

August 05, 2019
It has grown more challenging to protect patient privacy and secure sensitive data under HIPAA (Health Insurance Portability and Accountability Act) as the volume and persistence of cyber attacks have increased in recent years. Healthcare institutions often have vast databases of sensitive information such as credentials and credit card data that cyber criminals seek to monetize and sell on the dark web.

IT Security: How Much Should You Spend?

July 23, 2019
Just how much should you be spending on IT Security? It’s a vexing question to answer for many reasons as each situation has their unique circumstances and factors. But here are some insights garnered over the last decade in cybersecurity.

7 Questions Answered About Windows 7 End-of-Support

July 10, 2019
Is your organization still using Windows 7? Microsoft support is coming to a close in a few short months. If you think end-of-support for legacy systems doesn't impact your organization, think again.

3 Do's and 1 Don't to Improve Your IT Security

June 03, 2019
Overwhelmed by the hype from security vendors in overdrive? Notice the innovation and trends and feel like jumping on the bandwagon? It’s a urge that many buyers in mid-size companies feel and it can be overpowering. That flashy vendor demo, that rousing speech at a tradeshow, that pressure of keeping up with the Joneses. So what have you done for your security lately is a nagging thought.
 

Protecting Legal Data: 3 Ways MSPs Can Enhance Cybersecurity

May 22, 2019
The legal world is centered on offering clients protection—and in the current technology environment, that extends to cybersecurity. With the proper security procedures, policies, training, and IT security in law firms, advanced cybersecurity is yet another way that lawyers can protect their clients today.

The Four Elements that Build a Better SD-WAN for Retail

April 30, 2019
Building a better branch network for retailers is not necessarily rocket science. At least, it doesn’t have to be. The formula for building a better branch for these highly distributed businesses is rather simple. When you think about it, it is more like alchemy than chemistry. Like air, earth, fire, and water, it does not take more than four elements to define the ideal branch network.

How to Protect Financial Data: 4 Cyber Risks MSPs Can't Ignore

April 25, 2019
Banks have always been a prime target for cybercriminals. With enormous stores of cash and consumer data, and the massive threat of financial losses, regulatory consequences, and reputational damage, there’s really no choice for financial institutions but to innovate and accelerate their cybersecurity strategies.

Protecting Managed Service Providers from Cyber Attacks

April 15, 2019
As a Managed Service Provider (MSP) offering IT infrastructure and end-user systems, your clients rely on you with their valuable assets, sensitive data, and intellectual property. What security best practices can MSPs utilize to avoid becoming a headline?

How to Justify EDR with Three Top Business Cases

April 03, 2019
Increasing complexity and frequency of attacks have escalated the need for detection of attacks and incident response. Endpoints are the new battleground as they are a) more pervasive across the network, b) more commonly used by non-IT personnel, and c) less well-defended by IT teams who first move to secure the data center. Endpoint detection and response (EDR) solutions meet the need to rapidly investigate large numbers of systems for evidence of malicious activity, quickly uncover, and then remediate attacks and incidents.

How to Protect Healthcare Data: 5 Cybersecurity Tips for MSPs

April 01, 2019
For MSPs serving clients in the healthcare industry, protecting data can be complex. With compliance enforcement like HIPAA , for instance, distinguishing the owner of your clients’ data is critical —especially due to the lack of security awareness training amidst healthcare end users. Here are the five key data security tips to better protect SMB clients in healthcare.

SIEMpocalypse?

March 20, 2019
Did you know that Microsoft is a security vendor? No, it’s true. For years, the company was hammered by negative public perception and the butt of jokes around the 2002 "trustworthy computing" memo. The company has steadily invested in developing a security mindset and the product results are now more visible to the public.

What is EDR and Why It is Critical to SMB Security?

February 25, 2019
Over 7 billion global devices in an always on and continuously connected world create a soft target for today’s attacker. Whether working to monetize data or make a political statement, adversaries are well funded and staffed in the battle for endpoint access and control.

5-Minute Guide to SD-WAN, MPLS, SD-Branch, NGFW, and More

February 11, 2019
The networking market is loaded with ambiguous buzzwords and competing acronyms that make it difficult to clearly distinguish one capability from another. So, let’s break down those buzzwords and competing acronyms that are the most commonly compared as if they were apples to apples.

Five Takeaways from the 2019 SIEM Study

January 31, 2019
We recently released the findings of the Security Information and Event Management (SIEM) study conducted by Cybersecurity Insights. The study surveyed over 345 IT and Security executives and practitioners, with 45% of them small and mid-sized firms with 999 or fewer employees and the balance comprised of enterprise organizations with 1,000 or more employees.

Practical Ways to Implement Threat Hunting

January 24, 2019
If you think your organization is too small to be targeted by threat actors, think again. Over 60% of organizations have experienced an exploit or breach, so the stealthy and ever-evolving hacker may already be in your organization performing reconnaissance or awaiting strategic command and control (C&C) instructions.

New to SD-Branch? 8 Things Retail IT Pros Need to Know.

January 21, 2019
The complexities and costs of IT network management and security in retail stores has reached a breaking point. Today’s retail IT professional, point-of-sale reseller, or managed IT service provider is struggling to effectively deploy, manage, and secure the network in these branch locations in an efficient and affordable way.