Netsurion logo Netsurion logo
  • Managed Threat Protection
    Back
    Managed Threat Protection
    EventTracker

    Powerful threat prediction, prevention, detection, and response along with compliance in a scalable, simple managed solution.

    • Solution Overview Managed Threat Protection
    • Platform Details Threat Protection Platform
    CapabilitiesKey Capabilities
      Back
      Key Capabilities
    • Security Operations Center
    • SIEM
    • Endpoint Security
    • Threat Detection & Response
    • Intrusion Detection
    • Vulnerability Management
    • Threat Hunting
    • Ransomware Protection
    • Microsoft 365 Security
    • Regulatory Compliance
    Business ApplicationsBusiness Applications
      Back
      Business Applications
    • Private Equity
    • Banking & Financial Services
    • Healthcare & Pharmaceutical
    • Retail & Hospitality
  • Secure Edge Networking
    Back
    Secure Edge Networking
    BranchSDO

    All-in-one networking solution that combines network connectivity, agility, security, and compliance in an affordable managed solution.

    • Solution Overview Managed Secure Edge Networking
    • Platform Details Edge Networking Platform
    CapabilitiesKey Capabilities
      Back
      Key Capabilities
    • Network Operations Center
    • Secure SD-WAN
    • Next-Gen Firewall
    • Network Threat Response
    • Network Segmentation
    • Cellular Failover
    • Wi-Fi Management
    • PCI DSS Compliance
    Business ApplicationsBusiness Applications
      Back
      Business Applications
    • Point-of-Sale Security
    • Restaurant & Hospitality
    • Retail & C-Store
    • Branch Offices
  • Partners
    Back
    Partners
    Partner Program Overview

    Accelerate business growth through our award-winning partner program.

    • Partner Program Overview
    • Managed Service Provider Program
    Partner Program Overview Image
  • Insights
    Back
    Insights
    Insights
    • View All
    • Cybersecurity
    • Edge Networks
    • Compliance
    • SOC Catch of the Day
    • Webcasts & Events
    Insights Image
  • Company
    Back
    Company
    About Us
    • About Netsurion
    • Leadership
    • News
    • Careers
    • Contact Us
    About Us Image
  • Support
    • myNetsurion
    • BranchSDO Support
    • EventTracker Support
  • Support
  • myNetsurion
  • Contact Us
  • How to Buy

Insights

View the latest webcasts, videos, articles, whitepapers, and more.

HomeInsights

Topic

Type

Industry

ARTICLE
Compliance Networking Cybersecurity

Renew Focus on Web Application Security

Today’s always-on digital businesses and service providers rely on web applications and APIs to fuel growth, run eCommerce sites...

ARTICLE
Compliance Networking Cybersecurity

Key Takeaways from MITRE ATT&CKcon 3.0 for Defenders

MITRE ATT&CKcon 3.0, the conference dedicated to the ATT&CK community, returned at MITRE headquarters in Virginia last month. As...

WHITEPAPER
Compliance Networking Cybersecurity

Why Managed XDR is the Future of Cybersecurity Operations

The escalating threat landscape is driving the need for a more proactive approach to cybersecurity. While Extended Detection and Response...

ARTICLE
Compliance Networking Cybersecurity

Improve Security with a Cyber Hygiene Routine

As advanced threats continue to morph and escalate, it’s easy to gravitate towards the latest tool or “shiny object” in...

ARTICLE
Compliance Networking Cybersecurity

Consolidation: The Cure for Cybersecurity Vendor Sprawl

There are three cybersecurity “givens” that small-to-medium-sized businesses (SMBs) often face. One is you are not too small...

ARTICLE
Compliance Networking Cybersecurity

Ransomware Protection: Who’s Responsible for What?

Ransomware risk changed dramatically for Managed Security Service Providers (MSSPs) and their clients in 2021. The Kaseya hack used a...

ARTICLE
Compliance Networking Cybersecurity

Demystifying MDR: Five Myths for MSSPs

Small-to-medium-sized businesses (SMBs) are continuously seeking ways to safeguard their data and resiliency against persistent criminals...

ARTICLE
Compliance Networking Cybersecurity

Cloud and SaaS Security: Mind the Gap

Software-as-a-Service (SaaS) applications and infrastructure providers like Amazon Web Services (AWS) and Microsoft Azure have become the...

ARTICLE
Compliance Networking Cybersecurity

How to Combat the Rising Costs of Cybersecurity Insurance

Even though your business may have cybersecurity insurance, it doesn’t mean you can avoid the steps necessary to prevent bad things...

WHITEPAPER
Compliance Networking Cybersecurity

Adopting a ‘Zero Trust’ Approach to Retail Data Security

To better protect themselves and their customers, retailers need to adopt a cybersecurity approach that safeguards data wherever it...

ARTICLE
Compliance Networking Cybersecurity

MSPs Versus Ransomware in 2022: Where Multi-Layered Security Fits In

Skyrocketing ransomware threats and extortion demands show no sign of slowing down in 2022. Average ransomware demands surged by 518% in...

ARTICLE
Compliance Networking Cybersecurity

Optimize Restaurant Cybersecurity with Real-World Best Practices

Netsurion is a key contributor along with other industry leaders who comprise the Restaurant Technology Network (RTN) Working Group. The...

WHITEPAPER
Compliance Networking Cybersecurity

Restaurant Technology Network - Restaurant Cybersecurity Operations

Quick-serve and fast casual restaurants are a perennial top target for cyber attacks due to the decentralized nature and high volume of...

ARTICLE
Compliance Networking Cybersecurity

MSPs: How to Add Security Services Fast and Affordably

You’ve seen it over and over again in the headlines – small subcontractors are often soft-target gateways for hacking large...

ARTICLE
Compliance Networking Cybersecurity

Vulnerability Management and Protection: Think Like a Hacker

Today’s modern attack surface encompasses the network, cloud, endpoints, mobile devices, and applications and is constantly under...

PAGE
Compliance Networking Cybersecurity

October is National Cybersecurity Awareness Month

Being “cyber secure” is not for the faint of heart. As part of National Cybersecurity Awareness Month, we are counting down...

ARTICLE
Compliance Networking Cybersecurity

Future Proof Your Restaurant Technology with These Simple Steps

Within the next five years, there is a good chance that every wire, except power, in brick-and-mortar stores will be gone. Data will be...

ARTICLE
Compliance Networking Cybersecurity

How to Overcome Three Major Cybersecurity Budget Hurdles

Success starts with a well-planned strategic budget. Face the fear…now’s the time to plan for powerful yet practical...

VIDEO
Compliance Networking Cybersecurity

How a lack of trust is actually a good thing in securing retail data​

Retailers are operating differently today, moving out of locked corporate perimeters and into web-on-the-go. To better protect themselves...

SOC CATCH
Compliance Networking Cybersecurity

MITRE ATT&CK Guides MSP on Cobalt Strike Threat Mitigation

The Network:  A major retailer with over 2,500 employees and more than 100 stores and distribution centers is supported by an MSP who...

ARTICLE
Compliance Networking Cybersecurity

Use MITRE ATT&CK to Thwart Ransomware Faster

Ransomware has made a resurgence and is impacting both IT service providers and the businesses they serve. What if you had insights into...

VIDEO
Compliance Networking Cybersecurity

What Is XDR and Does It Warrant Investment

Over the last decade we have seen the security technology market constantly splinter into smaller categories as emerging technology and...

VIDEO
Compliance Networking Cybersecurity

Ransomware Attack Through Kaseya VSA

A.N. Ananth outlines what happened with the Kaseya VSA ransomware attack, how it compares to the SolarWinds vulnerability, how Netsurion...

ARTICLE
Compliance Networking Cybersecurity

Ransomware-as-a-Service is Skyrocketing

No matter what business you are in, it’s likely you view ransomware as one of the top cyber threats today. Adversaries are adapting...

ARTICLE
Compliance Networking Cybersecurity

Five Myths About Ransomware

Ransomware is a popular weapon for cyber criminals. Worldwide in 2020, there were 304 million ransomware attacks, a 62% increase from the...

VIDEO
Compliance Networking Cybersecurity

Secure Edge Networking by Netsurion

Secure Edge Networking, powered by BranchSDO, is a store’s “network-in-a-box” that delivers greater agility and reliability for the...

ARTICLE
Compliance Networking Cybersecurity

Criminal Gang NOBELIUM Ramps Up Attacks

Threat researchers detected threat group NOBELIUM conducting several waves of malicious spear phishing email campaigns. Each wave used...

ARTICLE
Compliance Networking Cybersecurity

Why Managed Endpoint Security Eliminates Cybersecurity Blind Spots

Incomplete cybersecurity information visibility comes at a cost. Without real-time comprehensive visibility, organizations experience...

VIDEO
Compliance Networking Cybersecurity

What Should XDR Solutions Do for You

A.N. Ananth outlines Extended Detection and Response (XDR), its benefits, and use cases. He covers how Netsurion’s Managed Threat...

WHITEPAPER
Compliance Networking Cybersecurity

Multi-Unit Restaurant Brands Save Time and Money with Network Standardization

Brand management and the maintenance of operational standards are critical components of restaurant franchising. Training, documentation...

WHITEPAPER
Compliance Networking Cybersecurity

Restaurant Technology Network POS Security Implementation Best Practices

Point of Sale (POS) systems are a part of every concept and size of restaurant, but they are implemented and deployed in ways that lead...

VIDEO
Compliance Networking Cybersecurity

Building Upon Microsoft 365’s Security Foundations

As one of the most used application suites, Microsoft (Office) 365 continues to ingrain its applications, products, and data into...

CASE STUDY
Compliance Networking Cybersecurity

Sport Clips Haircuts

Netsurion’s support process was also a key differentiator. We were assigned a Technical Solutions Engineer, Implementation Engineer...

SOC CATCH
Compliance Networking Cybersecurity

PowerShell Threat Neutralized by MSP of Financial Client

The Network: A well-known Managed Service Provider (MSP) uses Netsurion’s EventTracker solution to provide SOC-as-a-Service (SOCaaS) to...

ARTICLE
Compliance Networking Cybersecurity

Show Your Loyal Restaurant and Retail Customers Some Love by Protecting Them and Adhering to PCI...

Compliance can get confusing fast. Restaurants and retail establishments have many voices talking about compliance. Most of the time, the...

ARTICLE
Compliance Networking Cybersecurity

MDR is a Critical Capability for MSSPs: Keys to Making the Right Choice

MSSPs need airtight threat detection and rapid, reliable remediation. The optimal way to do this is to ensure you have top-notch MDR...

VIDEO
Compliance Networking Cybersecurity

Why MSSPs are Enhancing SOC-as-a-Service

In today’s Service Provider ecosystem, SOC-as-a-Service (SOCaaS) has become an accepted model for delivering cybersecurity capabilities. ...

ARTICLE
Compliance Networking Cybersecurity

Ten Steps to Defend Your Microsoft Exchange Servers from ProxyLogon Exploit

Microsoft has detected multiple zero-day exploits being used to attack on-premises versions of Microsoft Exchange Server. According to...

ARTICLE
Compliance Networking Cybersecurity

Building Trust: Four Tips for MSSPs

Customers look to Managed Security Service Providers (MSSPs) as trusted advisors in achieving digital transformation and navigating ever...

ARTICLE
Compliance Networking Cybersecurity

How SOC-as-a-Service Enhances Security Operations

Faced with rising cybersecurity concerns, MSPs and mid-sized organizations are maturing their security posture beyond a network...

VIDEO
Compliance Networking Cybersecurity

Lessons Learned in 2020, and Where Managed Security is Heading in 2021

This past year challenged us in novel ways and with dramatic shifts, but it also provided many lessons. While 2021 will provide new...

WHITEPAPER
Compliance Networking Cybersecurity

Six Technology Trends to Help Restaurants Rebound in 2021

Many fast casuals managed to pivot quickly in 2020 to a new way of doing business by adding or increasing virtual interactivity, shaking...

VIDEO
Compliance Networking Cybersecurity

How CISOs are Preparing for 2021

To stay secure in the modern connected world, businesses must keep track of all emerging cybersecurity threats, no matter in which form...

VIDEO
Compliance Networking Cybersecurity

Is Your Restaurant Technology Ready for 2021?

Retrospective into a disruptive year, and an outlook into what's yet to come. Ready to close the book on 2020? Yeah, we all are. But...

VIDEO
Compliance Networking Cybersecurity

Defend Against Insider Threats: Why They are Hard to Find & Stop

Insider threats continue to be on the rise, and are now estimated to comprise 30% of all cyber incidents. While external threats often...

ARTICLE
Compliance Networking Cybersecurity

Front-Line MSSPs Share 2021 Cybersecurity Predictions

In 2020, we saw digital transformation accelerate along with rising ransomware, threats caused by human error and misconfigurations, and...

PAGE
Compliance Networking Cybersecurity

Ready to Hire an Affordable 24/7 Cybersecurity Professional?

Mid-market organizations continue to be challenged by the need for cybersecurity, and the difficulty in finding budget for a full-time IT...

WHITEPAPER
Compliance Networking Cybersecurity

How Restaurant Chains can Thrive, not Just Survive, with the Right Technology Foundation

Competitive pressures have never been more significant for chain restaurant operators. This pressure comes not only from existing...

CASE STUDY
Compliance Networking Cybersecurity

Retail Data Systems (RDS)

With Netsurion’s BranchSDO CXD all-in-one platform, we found an ideal fit by combining routing, firewall, cellular failover, and Wi...

ARTICLE
Compliance Networking Cybersecurity

8 Threats to Watch for this Holiday Season

This holiday season will be like no other with the continued use of remote work, greater online sales, third-party sourcing from...

ARTICLE
Compliance Networking Cybersecurity

3 Tips to Stretch Your Cybersecurity Dollar

Businesses are always looking for ways to deliver increased value to clients while optimizing efficiency, and this year is no exception...

VIDEO
Compliance Networking Cybersecurity

How the Endpoint Protection Evolution is Changing Managed Detection and Response

For far too long, cybersecurity professionals have had to cobble together multiple tech tools and staff augmentation to round out their...

VIDEO
Compliance Networking Cybersecurity

Digital Transformation of Retail Brands: Dealing with the Impact of COVID-19

The crisis produced by the COVID-19 pandemic has dramatically changed consumer behavior and accelerated the digital transformation of the...

VIDEO
Compliance Networking Cybersecurity

Connection Lost: The Other Current Threat to Restaurants

The shutdowns that have occurred over the last six months have drastically changed how people are ordering and picking up their food. The...

ARTICLE
Compliance Networking Cybersecurity

Think Like a Hacker with MITRE ATT&CK

The threat landscape continues to accelerate, with sophisticated attacks becoming more commonplace as ransomware-as-a-service accelerates...

VIDEO
Compliance Networking Cybersecurity

MITRE ATT&CK for MSPs: Faster Threat Detection and Response

The MITRE ATT&CK™ framework is an ever-expanding knowledge base of known adversarial tactics and techniques that enables cyber defenders...

ARTICLE
Compliance Networking Cybersecurity

Key Elements of MDR for Powerful and Practical Cybersecurity

The rise in ransomware attack volume and sophistication is a wake-up call for executives and IT departments alike. Traditional perimeter...

WHITEPAPER
Compliance Networking Cybersecurity

Restaurant Technology Network Off-Premises Playbook

Netsurion is a proud early member of the Restaurant Technology Network (RTN). The RTN is a membership community dedicated to the...

ARTICLE
Compliance Networking Cybersecurity

Understanding MDR, EDR, EPP, and XDR

The cybersecurity industry is notorious for coining terms and acronyms that rise and fall out of favor before they even have a chance to...

ARTICLE
Compliance Networking Cybersecurity

What is SASE, SD-WAN, and SD-Branch?

Trying to figure out what is really the difference between SASE, SD-WAN, and SD-Branch? Rest assured you are not alone. Before...

VIDEO
Compliance Networking Cybersecurity

Deepening Endpoint Security with AI and Human Intelligence

The first look at our new endpoint threat prevention capabilities integrated into EventTracker. This strategic partnership deepens...

VIDEO
Compliance Networking Cybersecurity

Creative Ways to Optimize Restaurant IT Spending at Time of Crisis

The social and economic impact of the COVID-19 pandemic is accelerating the pace of the digital transformation of the multi-unit...

VIDEO
Compliance Networking Cybersecurity

Get Serious About Selling SMB Cybersecurity: Why and How to Sell to SMBs

More than 75% of SMBs would change MSPs if they felt they would receive better protection. Netsurion wants to help you understand the...

VIDEO
Compliance Networking Cybersecurity

Unexpected Secret Sauce for Increasing Profit Margin

Restaurant businesses thrive off of innovation, speed, and efficiency. But with thin profits getting thinner, some national chains are...

VIDEO
Compliance Networking Cybersecurity

Dark Web Intelligence: Going Deeper Than Compromised Credentials

Threat actors are increasingly gathering across the dark web to coordinate, plan, and launch attacks, some of which can be exposed via...

SOC CATCH
Compliance Networking Cybersecurity

Crypto mining via PowerShell Caught at Retailer

A retailer with over 400 employees, over twelve distribution warehouses, and an extensive supply chain network to protect.

INFOGRAPHIC
Compliance Networking Cybersecurity

MSP Margins are Becoming Slimmer and Customers Less Loyal

As an MSP, your focus should be on developing trust, strategy, and a reliable partnership. MSP margins are becoming slimmer and customers...

CASE STUDY
Compliance Networking Cybersecurity

Co-Managed SIEM for Local Government

Netsurion provides 24/7 coverage and reduces false positives. Our small IT and security staff are too busy to chase after log data...

VIDEO
Compliance Networking Cybersecurity

Optimize Restaurants Online Orders and Curbside Pickup

With online ordering and curbside pick-up buoying restaurants, what are the operational and technical considerations needed to...

PAGE
Compliance Networking Cybersecurity

Network Savings Calculator

Netsurion's secure edge networking for retail and hospitality dramatically reduces cost and increases network reliability...

ARTICLE
Compliance Networking Cybersecurity

Is Your Restaurant’s Technology Optimized for the New Normal?

Amid the COVID-19 crisis, restaurants have been forced to quickly adapt to a takeout- and delivery-only model, leaving brands scrambling...

WHITEPAPER
Compliance Networking Cybersecurity

Eating up profits: The High Cost of Restaurant POS Downtime

One tenth of 1 percent. It might not seem like much, but it adds up. And when that one tenth of one percent is POS downtime, it adds up...

ARTICLE
Compliance Networking Cybersecurity

Securing Zoom Conferencing to Protect Data

Business uncertainty has led to widespread adoption of working from home. Since most meaningful tasks in any organization require...

VIDEO
Compliance Networking Cybersecurity

Deconstructing Ransomware to Protect Small and Medium Business

Ransomware is quietly persisting while other stories make headlines, and is now increasingly targeting small and medium sized business...

CASE STUDY
Compliance Networking Cybersecurity

SOC-as-a-Service for Business Information Solutions

The Netsurion EventTracker SOC became an extension of the BIS team, providing additional resources that they didn’t have previously.

ARTICLE
Compliance Networking Cybersecurity

Top 3 Must-Have Restaurant Technologies for Increased Takeout Business

Despite current challenges, the restaurant industry is adapting to the new reality of social distancing with creativity while doubling...

VIDEO
Compliance Networking Cybersecurity

Transforming the Restaurant Network with SD-Branch

Quick-service and fast-casual restaurants are struggling to keep up with digital transformation needs while controlling cost and...

ARTICLE
Compliance Networking Cybersecurity

Use VPN Properly to Support Work-from-Home Employees

With most employees working from home amid COVID-19 (coronavirus) outbreak, VPN servers have now become paramount to a company's...

ARTICLE
Compliance Networking Cybersecurity

Ten Work-from-Home Cybersecurity and Productivity Tips

More Work-from-Home (WFH) scenarios due to COVID-19 present challenges as employees move from a trusted and secured office network to...

SOC CATCH
Compliance Networking Cybersecurity

MITRE ATTACK Enriches Ransomware Detection

A United Kingdom-based Managed Service Provider (MSP) specializing in managed IT, cloud, telecom, and security monitoring services uses...

ARTICLE
Compliance Networking Cybersecurity

Expanding Work-from-Home Increases Cybersecurity Risk

Maintaining strong cybersecurity is crucial as organizations make impromptu decisions to send more and more employees to work from home...

VIDEO
Compliance Networking Cybersecurity

Leveraging MITRE ATT&CK® for Increased Cybersecurity Effectiveness

The MITRE ATT&CK® framework is an ever-expanding knowledge base of known adversarial tactics and techniques that enables cyber defenders...

ARTICLE
Compliance Networking Cybersecurity

RSA Conference Key Takeaways for Cybersecurity Defenders

RSA Conference 2020 has come and gone. It still maintains its status as the largest security event in the world, although attendance...

ARTICLE
Compliance Networking Cybersecurity

Avoid Log Monitoring Gaps with Holistic Coverage

A data breach today takes 127 days to detect, according to the Ponemon Institute. Comprehensive visibility and real-time analysis of...

SOC CATCH
Compliance Networking Cybersecurity

Keylogger on MSP Endpoints

A mid-sized Managed Security Provider (MSP) uses Netsurion's SIEM (Security Information and Event Management) and SOC-as-a-Service...

ARTICLE
Compliance Networking Cybersecurity

Learn Why Data Privacy is Good for Your Business

Following many high-profile data breaches, consumers have elevated data privacy to front-page news and included it as criteria for brand...

WHITEPAPER
Compliance Networking Cybersecurity

Practical Guide to Cybersecurity for Restaurants and Hotels

Cybersecurity is complex enough as it is. But merchants are dealing with misinformation that further compounds the complexity, causing...

CASE STUDY
Compliance Networking Cybersecurity

Secure Edge Networking for Staley Technologies

Already we can see that customers that have Netsurion installed have had fewer network-related calls than our customers that do not have...

VIDEO
Compliance Networking Cybersecurity

Your Roadmap from MSP to MSSP: Avoid Speedbumps and Accelerate Success

Every managed service provider (MSP) is evaluating managed security services to protect their customers and increase revenue. But how...

VIDEO
Compliance Networking Cybersecurity

Cybersecurity Holiday Tips

The holiday season is upon us and Netsurion is here to remind you that cybercrime doesn't take a holiday. View the video for tips to stay...

VIDEO
Compliance Networking Cybersecurity

2020 Predictions for the Partner Channel

In 2020, we believe cybersecurity convergence will become the difference maker. It will enable MSPs to deliver effective cyber threat...

ARTICLE
Compliance Networking Cybersecurity

5 Smart Ways to Thwart Login Attacks

Just like locking your front door is crucial to protect your house, monitoring account logins to organizational servers and workstations...

ARTICLE
Compliance Networking Cybersecurity

Cybercrime Doesn't Take a Holiday

The holidays are a busy time for most business owners as they ramp up to serve consumers excited to find holiday specials, or even as...

SOC CATCH
Compliance Networking Cybersecurity

Anomalous Login Attack Detected

The Network: A large Managed Service Provider (MSP) uses EventTracker SIEM + SOC-as-a-Service (SOCaaS) from Netsurion for their end...

CASE STUDY
Compliance Networking Cybersecurity

Co-Managed SIEM for an Insurance Company

We built our security processes around Netsurion’s EventTracker Co-managed security. We want to be proactive versus reactive and...

CASE STUDY
Compliance Networking Cybersecurity

Co-managed SIEM/SOC for a Healthcare Company

Trust is everything in the healthcare community. Netsurion’s co-managed SIEM/SOC solution addresses our staff challenges with...

VIDEO
Compliance Networking Cybersecurity

Visibility and Insights delivered by an SD-Branch Solution

For highly distributed enterprises like retail, restaurant, and stores of all kinds, the branch location is the lifeblood of the business...

WHITEPAPER
Compliance Networking Cybersecurity

Restaurant Digital Transformation with SD-Branch

How Fast Casual and Quick Service Restaurants innovate while protecting the brand and profitability with a software-defined branch...

WHITEPAPER
Compliance Networking Cybersecurity

Maximizing Endpoint Security

There are many more endpoints than fortified servers in the data center, and they are staffed by non-technical users who present softer...

SOC CATCH
Compliance Networking Cybersecurity

MSP Detects Ransomware at Service Industry Client

The Network: A well-known Managed Service Provider (MSP) specializing in infrastructure monitoring and management, disaster recovery, and...

ARTICLE
Compliance Networking Cybersecurity

Five Things to Consider for Point-of-Sale Cellular Failover Connectivity

If a multi-location business is looking for cellular failover connectivity to ensure business continuity in the event of a blackout or...

ARTICLE
Compliance Networking Cybersecurity

7 Steps to Better Website Security for National Cybersecurity Awareness Month

Threats and threat actors continue to evolve and morph, creating advanced and even more dangerous tactics to mitigate. October is...

PAGE
Compliance Networking Cybersecurity

Maximize Value from SIEM - TCO Calculator

The challenge many face is the lack of qualified analysts for in-house SIEM. This is why Co-Managed SIEM is on the rise…it...

ARTICLE
Compliance Networking Cybersecurity

Is the ELK Stack a SIEM?

The ELK (Elasticsearch, Logstash, Kibana) stack is a popular open source log analysis and management platform. The collection, processing...

VIDEO
Compliance Networking Cybersecurity

5 Things to Consider in 4G Failover Connectivity

One of the key benefits for most businesses deploying SD-WAN is the reduction in WAN costs by up to 80 percent. Continuity and resilience...

ARTICLE
Compliance Networking Cybersecurity

Best Practices to Halt Insider Threats

While nation-state threat actors and external hackers often garner the headlines, insider threats are an often-overlooked threat vector...

WHITEPAPER
Compliance Networking Cybersecurity

When Retail Digital Transformation Equals Digital Disruption

Retail IT Networks Under Stress: How a software-defined branch network (SD-Branch) helps retailers innovate without business interruption.

ARTICLE
Compliance Networking Cybersecurity

When Digital Transformation Equals Digital Disruption

The retail industry has come a long way during the last decade. Online ordering, in-store beacon technology, cloud POS, omnichannel...

WHITEPAPER
Compliance Networking Cybersecurity

A Dollar of Prevention is Worth a Bitcoin of Cure

A true story of how one organization was impacted by a data breach. This executive brief shares the true story of an organization, who we...

ARTICLE
Compliance Networking Cybersecurity

Coordinated Ransomware Attacks Hit Resource-Constrained Municipalities

A financially motivated ransomware gang hit 23 local governments in Texas in a coordinated attack. Ransomware is a type of malicious...

ARTICLE
Compliance Networking Cybersecurity

Black Hat Recap: Cybersecurity Insights That Enhance Security Operations

Black Hat 2019 was a learning experience and success for all. All of the hackers, presenters, vendors, and attendees have gone home, but...

ARTICLE
Compliance Networking Cybersecurity

Mitigate Software Supply Chain Attacks with SIEM and EDR

At Black Hat 2019, Eric Doerr, GM of the Microsoft Security Response Center, reminded attendees of the interconnectedness of enterprise...

ARTICLE
Compliance Networking Cybersecurity

7 Things IT Pros Should Know about HIPAA and Protecting Patient Data

It has grown more challenging to protect patient privacy and secure sensitive data under HIPAA (Health Insurance Portability and...

CASE STUDY
Compliance Networking Cybersecurity

Cybersecurity for IT Managed Service Provider (MSP)

Netsurion’s EventTracker Essentials solution is the single most important product we’ve launched in our company’s...

ARTICLE
Compliance Networking Cybersecurity

IT Security: How Much Should You Spend?

Just how much should you be spending on IT Security? It’s a vexing question to answer for many reasons as each situation has their...

VIDEO
Compliance Networking Cybersecurity

MSPs are Under Attack: Keep Your Company and Your Customers Out of the Headlines

MSPs of all sizes are under constant threat from hackers trying to access end-customer systems. The biggest surprise is that most of...

VIDEO
Compliance Networking Cybersecurity

Building a Better Retail Branch with SD-WAN

Cloud adoption and digital transformation is driving SD-WAN to replace the traditional WAN. From this transformation, cloud-based...

INFOGRAPHIC
Compliance Networking Cybersecurity

What to Expect from Your SOC-as-a-Service

Are you experiencing a shrinking IT budget and a shortage of cybersecurity experts? Building and retaining a 24/7 SOC team in-house is...

VIDEO
Compliance Networking Cybersecurity

Windows 7 Migration A Reboot on Cybersecurity

Windows 7 is dead in January 2020. Fact is, the battle has shifted to the endpoint because there are more of them in the network, they...

ARTICLE
Compliance Networking Cybersecurity

7 Questions Answered About Windows 7 End-of-Support

Is your organization still using Windows 7? Microsoft support is coming to a close in a few short months. If you think end-of-support for...

VIDEO
Compliance Networking Cybersecurity

Routers Are they a thing of the past?

Join us as we explore the need for reliable, agile and secure branch offices. IT technology sprawl has resulted in complex, expensive...

PAGE
Compliance Networking Cybersecurity

How SMBs are Dealing with Cybersecurity Threats in 2019?

Small and medium-size (SMBs) have been the target of cyber attacks for a while now, however most are still not protecting themselves. Why...

VIDEO
Compliance Networking Cybersecurity

3 keys to Powerful Yet Practical Cybersecurity

The cybersecurity market is certainly not short on over-hyped tools designed to solve a specific threat vector. But what is an IT team to...

ARTICLE
Compliance Networking Cybersecurity

3 Do's and 1 Don't to Improve Your IT Security

Overwhelmed by the hype from security vendors in overdrive? Notice the innovation and trends and feel like jumping on the bandwagon? It...

ARTICLE
Compliance Networking Cybersecurity

Protecting Legal Data: 3 Ways MSPs Can Enhance Cybersecurity

The legal world is centered on offering clients protection—and in the current technology environment, that extends to cybersecurity...

PAGE
Compliance Networking Cybersecurity

Today's Cybersecurity Isn't as Secure as You Think

Companies try to prevent attackers from getting into their systems with the shotgun approach. They deploy a patchwork of multiple...

SOC CATCH
Compliance Networking Cybersecurity

Outdated Protocol Exposes University to Cyber Attack

The Network: A decentralized university with 34,000 students, dozens of departments, over 9,000 employees and hundreds of servers with...

VIDEO
Compliance Networking Cybersecurity

SD-Branch vs. VPN: How Do They Compare

The way we do business is changing. As critical business applications migrate to the cloud and rely on Hybrid architectures, networking...

ARTICLE
Compliance Networking Cybersecurity

The Four Elements that Build a Better SD-WAN for Retail

Building a better branch network for retailers is not necessarily rocket science. At least, it doesn’t have to be. The formula for...

ARTICLE
Compliance Networking Cybersecurity

How to Protect Financial Data: 4 Cyber Risks MSPs Can't Ignore

Banks have always been a prime target for cybercriminals. With enormous stores of cash and consumer data, and the massive threat of...

ARTICLE
Compliance Networking Cybersecurity

Protecting Managed Service Providers from Cyber Attacks

As a Managed Service Provider (MSP) offering IT infrastructure and end-user systems, your clients rely on you with their valuable assets,...

PAGE
Compliance Networking Cybersecurity

Protecting MSPs from Cyber Attacks

View insights on why Managed Service Providers (MSPs) are being targeted by adversaries so you and your end customers don’t fall...

ARTICLE
Compliance Networking Cybersecurity

How to Justify EDR with Three Top Business Cases

Increasing complexity and frequency of attacks have escalated the need for detection of attacks and incident response. Endpoints are the...

WHITEPAPER
Compliance Networking Cybersecurity

Why is VPN hard and how do you make it easy?

With all the benefits and features that SD-WAN architectures bring to businesses and distributed enterprises, there are also new...

ARTICLE
Compliance Networking Cybersecurity

How to Protect Healthcare Data: 5 Cybersecurity Tips for MSPs

For MSPs serving clients in the healthcare industry, protecting data can be complex. With compliance enforcement like HIPAA , for...

VIDEO
Compliance Networking Cybersecurity

Has Your Revenue Growth Slowed?

Shrinking opportunity, increased price pressure, difficulty getting meetings with prospects….the list goes on. Join Netsurion and David...

ARTICLE
Compliance Networking Cybersecurity

SIEMpocalypse?

Did you know that Microsoft is a security vendor? No, it’s true. For years, the company was hammered by negative public perception...

VIDEO
Compliance Networking Cybersecurity

SIEM Worst Practices: How To Sidestep Common Mistakes and Unlock SIEM’s True Potential

Netsurion’s Chief Strategy Officer A.N. Ananth joins Holger Schultze, CEO at Cybersecurity Insiders, outline Security Information and...

ARTICLE
Compliance Networking Cybersecurity

What is EDR and Why It is Critical to SMB Security?

Over 7 billion global devices in an always on and continuously connected world create a soft target for today’s attacker. Whether...

SOC CATCH
Compliance Networking Cybersecurity

EDR catches Emotet at MSPs Healthcare Customer

The Network: A Managed Service Provider (MSP) installed EventTracker Essentials with EDR to mitigate threats on 900 endpoints at a...

VIDEO
Compliance Networking Cybersecurity

What is SIEM and Why Is It Important?

Ever heard of Security Information and Event Management (SIEM)? Watch this brief video to learn more about SIEM and why it is an...

VIDEO
Compliance Networking Cybersecurity

Understanding the Cybersecurity Landscape

Proper cybersecurity includes controls to prevent, detect, and respond to cyber threats. This multi-layer cybersecurity strategy to...

SOC CATCH
Compliance Networking Cybersecurity

MSP Cures a Global Healthcare Non-Profit

The Network: A managed service provider (MSP) implemented the EventTracker Co-managed SIEM service for a healthcare non-profit...

ARTICLE
Compliance Networking Cybersecurity

5-Minute Guide to SD-WAN, MPLS, SD-Branch, NGFW, and More

The networking market is loaded with ambiguous buzzwords and competing acronyms that make it difficult to clearly distinguish one...

ARTICLE
Compliance Networking Cybersecurity

Five Takeaways from the 2019 SIEM Study

We recently released the findings of the Security Information and Event Management (SIEM) study conducted by Cybersecurity Insights. The...

ARTICLE
Compliance Networking Cybersecurity

Practical Ways to Implement Threat Hunting

If you think your organization is too small to be targeted by threat actors, think again. Over 60% of organizations have experienced an...

SOC CATCH
Compliance Networking Cybersecurity

Website Vulnerability Exposes Financial Firm

The Network: Our customer is a private equity real estate investment organization on the U.S. East Coast with more than $1B assets under...

ARTICLE
Compliance Networking Cybersecurity

New to SD-Branch? 8 Things Retail IT Pros Need to Know.

The complexities and costs of IT network management and security in retail stores has reached a breaking point. Today’s retail IT...

SOC CATCH
Compliance Networking Cybersecurity

Backup Server Blasted

The Network: Our customer is a leading digital marketing solutions company that empowers millions to find apartments and houses for rent.

VIDEO
Compliance Networking Cybersecurity

Battle IT Technology Sprawl with SD-Branch

Netsurion combines powerful yet easily-deployed edge devices and cloud orchestration, along with next-gen security, cellular failover and...

PAGE
Compliance Networking Cybersecurity

SMB Cyber Risk Today

Protecting a business’ IT infrastructure and data can be difficult with the abundance of threats out there, the array of new data...

VIDEO
Compliance Networking Cybersecurity

Cybersecurity War Stories: Bad Guys and Good Guys Both Represent a Risk to MSPs and their Client

Cybercriminals are not using traditional attack methods to invade your systems, so you can't use traditional cybersecurity defense to...

SOC CATCH
Compliance Networking Cybersecurity

Brute Force Attack in the Medical Field

The Network: An association in a specialty medical field is our customer who is dedicated to the highest standards of clinical care...

SOC CATCH
Compliance Networking Cybersecurity

Dubious Document Destroyed

The Network: Our client is an established law firm with more than 225 lawyers with a long history of well-planned growth, enduring client...

ARTICLE
Compliance Networking Cybersecurity

Is a Business Really Protected or is it Home Alone: Prevent, Detect, and Respond for True Security

Protecting a business’ IT infrastructure and data can be difficult with the abundance of threats out there, the array of new data...

SOC CATCH
Compliance Networking Cybersecurity

Phony Performance Warning Foiled

The Network: Our customer is a well-known law firm with more than 350 lawyers practicing across the globe who counsel multinational...

ARTICLE
Compliance Networking Cybersecurity

Cybersecurity Trends and Predictions 2019

The year 2018 saw ransomware families such as CryptoLocker and variants like Locky continue to plague organizations as cybersecurity...

SOC CATCH
Compliance Networking Cybersecurity

Emotet Interrupted in Hotel Chain

The Network: A Managed Service Provider (MSP) installed EventTracker to mitigate threats within a large hotel chain’s system in the U.S...

SOC CATCH
Compliance Networking Cybersecurity

Emotet Malware Ejected

The Network: Our customer is a major grocery chain with more than 150 stores in 22 states across the USA with a well-administered IT...

ARTICLE
Compliance Networking Cybersecurity

Top Ten Branch Network Predictions for 2019

It’s that time of the year again! Family and office holiday parties are gearing up, business projects are racing toward year-end...

SOC CATCH
Compliance Networking Cybersecurity

Fox Malware Outfoxed

The Network:  A cloud services provider headquartered in the Washington D.C. metro area served an end customer with EventTracker who had...

ARTICLE
Compliance Networking Cybersecurity

SD-Branch Solutions Are Optimizing Network Management and Security at the Edge

A refresh has come for distributed enterprises. In 2018, branch office WAN technology has been increasingly moving towards software...

PAGE
Compliance Networking Cybersecurity

Technology is Just The Tip of The Iceberg

SIEM (Security Information and Event Management) is foundational along with other technologies. But an integrated combination of platform...

CASE STUDY
Compliance Networking Cybersecurity

Secure Retail Networks for FTS Solutions

We look at Netsurion as a strategic, long-term partner, offering a great product at an affordable price. Netsurion is easy to do business...

SOC CATCH
Compliance Networking Cybersecurity

Vulnerable VoIP

The Network: A law firm with many offices worldwide who supplements their team with EventTracker’s co-managed 24/7 SIEM services...

WHITEPAPER
Compliance Networking Cybersecurity

Which SOC Approach is Best for You?

Every business–no matter its size–is a bullseye for cyber criminals. Data breaches cost an average of $3.6 million globally...

ARTICLE
Compliance Networking Cybersecurity

Buy, Rent, or Uber Your Security Operations Center

For cyber criminals, everyone’s a target. We must assume that, at some point, every organization’s IT infrastructure will be...

ARTICLE
Compliance Networking Cybersecurity

Why a Co-Managed SIEM?

In simpler times, security technology approaches were clearly defined and primarily based on prevention with things like firewalls...

ARTICLE
Compliance Networking Cybersecurity

Should You Replace Your MPLS with SD-WAN?

Many IT leaders are excited about the benefits of SD-WAN such as cost reduction, agility/flexibility, ease of deployment, and the options...

ARTICLE
Compliance Networking Cybersecurity

Accelerate Your Time-to-Value with Security Monitoring

A hot trend in the Managed Service Provider (MSP) space is emerging, transforming from an MSP to a Managed Security Service Provider...

ARTICLE
Compliance Networking Cybersecurity

Big Data or Smart Questions for Effective Threat Hunting

Advances in data analytics and increased connectivity have merged to create a powerful platform for change. Today, people, objects, and...

ARTICLE
Compliance Networking Cybersecurity

Master the Art of Selling Managed Security Services as an MSP

When it comes to selling security, one of the major challenges faced by managed services providers (MSPs) is changing the mind set of...

VIDEO
Compliance Networking Cybersecurity

Bracing for the Tidal Wave of Data Privacy Compliance in America

Ignorance is not bliss. As discussed in the webcast, Data Privacy Compliance in America is changing rapidly. Staying ignorant of the...

PAGE
Compliance Networking Cybersecurity

Are you PCI Compliant?

Learn how to simplify the compliance process and be audit-ready at all times, while still focusing on your business.

ARTICLE
Compliance Networking Cybersecurity

Three Causes of Incident Response Failure

Breaches continue to be reported at a dizzying pace. In 2018 alone, a diverse range of companies — including Best Buy, Delta...

ARTICLE
Compliance Networking Cybersecurity

Venom Vulnerability exposes most Data Centers to Cyber Attacks

Just after a new security vulnerability surfaced Wednesday, many tech outlets started comparing it with HeartBleed, the serious security...

ARTICLE
Compliance Networking Cybersecurity

Implementing a Central Log Collection System

Implement a Central Collection System Microsoft has made some considerable changes to event management in Windows Vista. But are these...

ARTICLE
Compliance Networking Cybersecurity

Pay Attention to System Security Access Events

There are five different ways you can log on in Windows called “logon types.” The Windows Security Log lists the logon type...

ARTICLE
Compliance Networking Cybersecurity

Tracking removable storage with the Windows Security Log

With data breaches and Snowden-like information grabs, I’m getting increased requests for how to track data moving to and from...

ARTICLE
Compliance Networking Cybersecurity

5 types of DNS attacks and how to detect them

DNS is an attractive mechanism for performing malicious activities like network reconnaissance, malware downloads, or communication with...

WHITEPAPER
Compliance Networking Cybersecurity

Top Considerations When Choosing a Failover Solution

Do you know what questions to ask when evaluating 4G LTE Failover solutions? Get the critical insights you need to make the right choice...

ARTICLE
Compliance Networking Cybersecurity

The Ultimate Playbook to Become an MSSP

Now that advanced cybersecurity protections are a must-have in today’s landscape, organizations of all sizes are increasingly...

SOC CATCH
Compliance Networking Cybersecurity

Remote Code Execution at Public Facing Website

The Network: A global management consulting firm with locations across the USA and UK.

SOC CATCH
Compliance Networking Cybersecurity

BootCD Booted off the Network

The Network: A bank holding company in the U.S. Midwest with an extensive IT infrastructure.

SOC CATCH
Compliance Networking Cybersecurity

HUER Trojan Downloader Quashed

The Network: The end customer of a well-known Managed Services Provider (MSP) who uses EventTracker Co-managed SIEM to deliver value to...

SOC CATCH
Compliance Networking Cybersecurity

HTTPS Request Smuggling

The Network: A mid-size financial institution on the U.S. East Coast. Hundreds of devices on the internal network. Redundant network...

VIDEO
Compliance Networking Cybersecurity

From POS Reseller to Managed Service Provider

Retail IT service providers are being asked over and over to do more for their customers, and the opportunity for recurring revenue is...

ARTICLE
Compliance Networking Cybersecurity

Future-Proof Your Failover Solution

The cost of network downtime or failing internet connectivity has never been higher due to incidents resulting in million-dollar losses...

ARTICLE
Compliance Networking Cybersecurity

Top 3 Microsoft 365 Security Concerns and What to do About Them

Microsoft 365 is immensely popular across all industry verticals in the small-to-medium-sized business (SMB) space. It is often the...

SOC CATCH
Compliance Networking Cybersecurity

Trickbot Attacks Promotional Products Industry

The Network: The end customer of a well-known Managed Services Provider (MSP) who uses EventTracker Co-managed SIEM to safeguard their...

ARTICLE
Compliance Networking Cybersecurity

The Bite Behind the Bark: Enforcement Power of GDPR

There’s an old saying: Their bark is worse than their bite. However, this is not the case with the penalties of non-compliance when...

ARTICLE
Compliance Networking Cybersecurity

Today’s CISO Challenges…The Talent Gap

It continues to be challenging being a Chief Information Security Officer (CISO) today – and this year promises no rest. As high...

CASE STUDY
Compliance Networking Cybersecurity

Cybersecurity and Compliance for Altamaha Bank & Trust

Our customers are priority #1. They come to us with an expectation and we want to deliver. The challenge is keeping up that level of...

VIDEO
Compliance Networking Cybersecurity

GDPR-Five Things You Should Know

GDPR is the biggest change in 20 years for European data security. All EU-based or multi-national companies must comply, but don’t forget...

PAGE
Compliance Networking Cybersecurity

The Cost of Doing Nothing

The cost of doing nothing can be greater than the cost of protecting your business.

ARTICLE
Compliance Networking Cybersecurity

Do you have a cyber blind spot?

What's the cost of securing your network from a cyber attack? According to Precision Analytics and The CAP Group, many companies are...

ARTICLE
Compliance Networking Cybersecurity

PCI Compliance and Hotels

To streamline operations, improve service and remain competitive, hotels use computers to handle numerous tasks. While automation...

ARTICLE
Compliance Networking Cybersecurity

Time is money. Downtime is loss of money.

The technological revolution has introduced a plethora of advanced solutions to help identify and stop intrusions. There is no...

ARTICLE
Compliance Networking Cybersecurity

Cybersecurity is an Investment, Not a Cost Center

The cybersecurity threat landscape is in constant motion – ever evolving. According to Kaspersky Labs, 323,000 new malware strains...

ARTICLE
Compliance Networking Cybersecurity

How to Protect Your Network from Ransomware Tips from the FBI

The FBI estimates that more than 4,000 ransomware attacks have occurred daily since the beginning of 2016. That...

ARTICLE
Compliance Networking Cybersecurity

The Difference Between a SIEM Solution and SIEM Tool: Features vs. Outcomes

Can you simply buy a “SIEM solution”? Turns out you really cannot, no matter how hard you try nor how passionately the vendor...

ARTICLE
Compliance Networking Cybersecurity

Catch Malware Hiding in WMI with Sysmon

Security is an ever-escalating arms race. The good guys have gotten better about monitoring the file system for artifacts of advanced...

ARTICLE
Compliance Networking Cybersecurity

Looking for Cost-Effective Business Continuity? Consider these five things before you buy.

One of the key benefits for most businesses deploying SD-WAN is the reduction in WAN costs by up to 80 percent. Continuity and resilience...

ARTICLE
Compliance Networking Cybersecurity

Host-based Versus Network-based Security

The argument is an old one; are you better off with a network-based detector, assuming all hosts will eventually communicate, or should...

ARTICLE
Compliance Networking Cybersecurity

The Top Considerations When Buying a 4G LTE Router

More and more businesses are adopting 4G LTE either to set up a backup network connection or to gain internet access when other means...

VIDEO
Compliance Networking Cybersecurity

A Day in the Life of Your Website

We spun up a dummy website to conduct an experiment on website cybersecurity. The results were very interesting. In less than 24 hours...

ARTICLE
Compliance Networking Cybersecurity

For of all sad words of tongue or pen, the saddest are these: 'We weren't logging'

It doesn't rhyme and it's not what Whittier said but it's true. If you don't log it when it happens, the evidence is gone...

ARTICLE
Compliance Networking Cybersecurity

Once More Unto the Data (Breach), Dear Friends

As I reflect on this year, a Shakespearean quote plays out in my mind – when King Henry the Fifth is rallying his troops to attack...

VIDEO
Compliance Networking Cybersecurity

Emotet A Tale of Two Cities: How One Municipality Neutralized the Threat Quickly

The Emotet virus has crippled Allentown, PA and is expected to cost an estimated $1 million dollars to fix the damage and remove the...

VIDEO
Compliance Networking Cybersecurity

Changes to PCI DSS v3.2 and What It Means for You

Are you compliant with PCI DSS Version 3.2? Restaurants, retailers, hotels, doctors' and lawyers' offices, and many more, all need to...

ARTICLE
Compliance Networking Cybersecurity

True Cost of Data Breaches

The Cisco Annual Cybersecurity Report provides insights based on threat intelligence gathered by Cisco's security experts, combined...

SOC CATCH
Compliance Networking Cybersecurity

Emotet Caught in a City

The Network: A municipal government serviced by an MSP requested that the EventTracker SIEM sensor be installed on hundreds of monitored...

ARTICLE
Compliance Networking Cybersecurity

What is SD-WAN and can it be used for smaller sites too?

SD-WAN is transforming enterprise networks with affordable network infrastructure by offering low-cost, reliable network connectivity...

VIDEO
Compliance Networking Cybersecurity

Let's Go Threat Hunting: Gain Visibility and Insight into Potential Threats and Risks

As the threat landscape continues to evolve mere protection, however diligent, is not practical to defend against threats. Adversaries...

ARTICLE
Compliance Networking Cybersecurity

The Perimeter is Dead: Long-live the Perimeter

In 2005, the Department of Homeland Security commissioned Livermore National Labs to produce a kind of pre-emptive post-mortem report.

VIDEO
Compliance Networking Cybersecurity

How does EMV and P2PE impact PCI compliance?

Cybersecurity is complex enough as it is. But to compound the issue, merchant businesses in the retail, restaurant, and hospitality space...

VIDEO
Compliance Networking Cybersecurity

Financial Cybersecurity Under Attack

It’s no secret that the financial industry is under attack. If we learn by recent examples, we know that technology alone is not enough...

VIDEO
Compliance Networking Cybersecurity

Is Your Network PCI DSS Compliant?

We all hear it over and over again: complying with data protection requirements is expensive. But did you know that the financial...

VIDEO
Compliance Networking Cybersecurity

Cybersecurity is Not Rocket Science

The word cybersecurity can seem daunting and bring to mind images of costly software and hardware needed to protect your business. But...

ARTICLE
Compliance Networking Cybersecurity

Changes to PCI DSS and What It Means for You

Are you compliant with PCI DSS Version 3.2? Restaurants, retailers, hotels, doctors' and lawyers' offices, and many more...

ARTICLE
Compliance Networking Cybersecurity

Can your Cybersecurity Posture be Called "Reactive Chaos"?

Does this sound familiar? You have no control of your environment and most of your efforts are diverted into understanding what happened,...

SOC CATCH
Compliance Networking Cybersecurity

Nemucod Nailed in the Network

The Network: A state government agency that performs financial audits of other government departments.

SOC CATCH
Compliance Networking Cybersecurity

Bloatware Banned from Bank

The Network: A bank serving multiple states on the U.S. East Coast with a headquarters and several dozen branch offices; 500+ servers and...

ARTICLE
Compliance Networking Cybersecurity

3-Minute Breakdown of Cybersecurity’s Biggest Buzzwords

The cybersecurity market is loaded with ambiguous buzzwords and competing acronyms that make it very difficult to clearly distinguish one...

ARTICLE
Compliance Networking Cybersecurity

Security Signals Everywhere: Finding the Real Crisis in a World of Noise

Imagine dealing with a silent, but mentally grating barrage of security alerts every day. The security analyst’s dilemma?

SOC CATCH
Compliance Networking Cybersecurity

Bunitu Trojan Trapped

The Network: A diversified global financial services company based on the U.S. east coast. Their IT team is supplemented by EventTracker...

CASE STUDY
Compliance Networking Cybersecurity

South River Electric Membership Corporation

South River Electric Membership Corporation, (South River EMC ) is a member-owned electric distribution cooperative that delivers...

ARTICLE
Compliance Networking Cybersecurity

Believe it or not, compliance saves you money

We all hear it over and over again: complying with data protection requirements is expensive. But did you know that the financial...

SOC CATCH
Compliance Networking Cybersecurity

Man-in-the-middle Disrupted at Multinational

The Network: A law firm with 14 offices worldwide. Their team is supplemented 24/7 by EventTracker’s co-managed security solution.

SOC CATCH
Compliance Networking Cybersecurity

Adware Creates a Nuisance at Energy Company

The Network: A non-profit Electricity Distribution Cooperative serving more than 100,000 members.

ARTICLE
Compliance Networking Cybersecurity

What You Don't Know Can Hurt You: Three InfoSec Retail Predictions

It has been a turbulent year for industry as a whole, and retail has been in the center of the turbulence. Amazon bought Whole Foods...

ARTICLE
Compliance Networking Cybersecurity

Attribution of an attack - don’t waste time on empty calories

When we are attacked, we feel a sense of outrage and the natural tendency is to want to somehow punish the attacker. To do this, you must...

SOC CATCH
Compliance Networking Cybersecurity

Kovter Cropped Before Doing Damage

The Network: A holding company that provides commercial and consumer banking. Their IT team is supplemented by Netsurion's co-managed...

ARTICLE
Compliance Networking Cybersecurity

Going Mining for Bitcoin

While you’ve been busy defending against ransomware, the bad guys have been scheming about new ways to steal from you. Let’s...

ARTICLE
Compliance Networking Cybersecurity

Prevention is Key in Cybersecurity

A lot of data, an overwhelming amount actually, is available from hundreds of sources, but rarely is it observed. Having something and...

ARTICLE
Compliance Networking Cybersecurity

Experimenting with Windows Security: Controls for Enforcing Policies

Interest continues to build around pass-the-hash and related credential artifact attacks, like those made easy by Mimikatz. The main...

INFOGRAPHIC
Compliance Networking Cybersecurity

Connectivity is The Key to Your Business

Connectivity is key to doing business these days, yet it is estimated that nearly 80% of connected devices are vulnerable to breach.

ARTICLE
Compliance Networking Cybersecurity

SIEM, UEBA, SOAR and Your Cybersecurity Arsenal

The evolution of Security Information and Event Management (SIEM) solutions has made a few key shifts over time. It started as simply...

ARTICLE
Compliance Networking Cybersecurity

You’re in the Cybersecurity Fight No Matter What: Are You Prepared?

“You’re in the fight, whether you thought you were or not”, Gen. Mike Hayden, former Director of the CIA and NSA...

SOC CATCH
Compliance Networking Cybersecurity

Blackhole Foiled at Global Law Firm

The Network: A law firm with 14 offices worldwide. Their team is supplemented by EventTracker SIEM on a 24/7 basis.

SOC CATCH
Compliance Networking Cybersecurity

Malware at the Domain Controller

The Network: A major nonprofit organization that supplements its team with Netsurion's co-managed security solution, EventTracker.

SOC CATCH
Compliance Networking Cybersecurity

Browser Hijacked at a Bank

The Network: A holding company that provides commercial and consumer banking. Their IT team is supplemented by EventTracker Enterprise...

SOC CATCH
Compliance Networking Cybersecurity

Brute Force Attack on Firewall Stopped

The Network: A nonprofit organization in healthcare research. The EventTracker SIEM service supplements their IT team.

ARTICLE
Compliance Networking Cybersecurity

Make a cybersecurity list and check it twice this holiday season

As the holidays swiftly approach, many of us are making lists and plans as part of the crescendo of year-end activity. We don’t...

ARTICLE
Compliance Networking Cybersecurity

The “Bumper-to-Bumper” Security Solution of POS Systems?

When Point-to-point encryption (P2PE) was standardized by the PCI Security Standards Council, many thought it would become the be-all end...

ARTICLE
Compliance Networking Cybersecurity

Which security functions outsource poorly and which outsource well

The IT security industry’s skill shortage is a well-worn topic. Survey after survey indicates that a lack of skilled personnel is a...

WHITEPAPER
Compliance Networking Cybersecurity

Practical Guide to Merchant Cybersecurity

Cybersecurity is complex enough as it is. But merchants are dealing with misinformation that further compounds the complexity, causing...

ARTICLE
Compliance Networking Cybersecurity

Avoid Three Common Active Directory Security Pitfalls

While the threats have changed over the past decade, the way systems and networks are managed have not. We continue with the same...

ARTICLE
Compliance Networking Cybersecurity

A haunting tale, just in time for the fall: Don’t let what happened to them, happen to you…

The old Haunted Hotel with squeaky wood floors, welcomed all guests who dared enter the front doors. Guests arrived from every nation...

ARTICLE
Compliance Networking Cybersecurity

Three myths surrounding cybersecurity

A common dysfunction in many companies is the disconnect between the CISO, who views cybersecurity as an everyday priority, versus top...

ARTICLE
Compliance Networking Cybersecurity

Report All the Binary Code Executing on Your Network with Sysmon Event IDs

Computers do what they are told, whether good or bad. One of the best ways to detect intrusions is to recognize when computers are...

SOC CATCH
Compliance Networking Cybersecurity

Crypto Currency Miner Exploits Hospital

The Network: A 150-bed hospital in the Caribbean that provides in and outpatient services. The Expectation: IT resources are to be

SOC CATCH
Compliance Networking Cybersecurity

CEO Phishing Through a Word Macro

The Network: A prominent hotel chain with several thousand locations worldwide. This problem was at a specific location on the U.S

SOC CATCH
Compliance Networking Cybersecurity

Phishing Installs Locky Ransomware

he Network: A leading branded merchandise agency with several locations in the U.S. This problem was at a specific location on

SOC CATCH
Compliance Networking Cybersecurity

Resort Front Desk – Gateway to Compromise?

The Network: A chain of vacation resorts with several locations in North America. The front desk is supposed to be the

SOC CATCH
Compliance Networking Cybersecurity

WannaCry Infects Health Care Provider

The Network: A not-for-profit 501(c)(3) community asset providing healthcare related services in many states in the southeast United States.

SOC CATCH
Compliance Networking Cybersecurity

Jaff Ransomware Caught at Georgia-based MSP

The Network: A Georgia-based IT outsourcing and technology services company that provides managed IT solutions to various companies and...

SOC CATCH
Compliance Networking Cybersecurity

File-less Click Fraud Trojan

The Network: A financial services firm in the Midwest U.S. with a very well run network security team on site. Netsurion’s Managed Threat...

SOC CATCH
Compliance Networking Cybersecurity

Trojan Detection at a Healthcare Organization

The Network: A healthcare services provider with an on-site security team. Netsurion’s Managed Threat Protection service supplements this...

SOC CATCH
Compliance Networking Cybersecurity

Exploit Caused by a Vulnerable Browser Plugin

The Network: Global fine dining company that operates in over 160 countries. The Expectation: Patch management processes and regular...

SOC CATCH
Compliance Networking Cybersecurity

Trojan Stopped in Healthcare Organization

The Network: A healthcare services provider on the west coast of the U.S. They use Netsurion’s co-managed Managed Threat Protection...

SOC CATCH
Compliance Networking Cybersecurity

Backdoor in PC Cleaner App Thwarted

The Network: A technology provider with an on-site IT team. Netsurion’s co-managed security solution, EventTracker, augments this team.

SOC CATCH
Compliance Networking Cybersecurity

Malware Booted on State Government Network

A U.S. state network with hundreds of servers and workstations across multiple organizations and distributed agencies statewide. The...

SOC CATCH
Compliance Networking Cybersecurity

Lax Access Steps Jeopardize Government Network

The Network: A U.S. federal government agency that is a long-standing user of EventTracker SIEM from Netsurion.

ARTICLE
Compliance Networking Cybersecurity

Can general purpose tools work for IT security?

This post got me thinking about a recent conversation I had with the CISO of a financial company. He commented on how quickly his team...

SOC CATCH
Compliance Networking Cybersecurity

Adware via the Web Browser

The Network: A Bank serving multiple states on the US East Coast with an HQ and several dozen branch offices; 500+

SOC CATCH
Compliance Networking Cybersecurity

After-hours Activity is Bad for Business

The Network: A financial institution with operations in multiple states in the USA. The Expectation: Workstations are extensively used at...

SOC CATCH
Compliance Networking Cybersecurity

Angler EK goes Fishing

The Network: A well regarded private university with nationally ranked academic programs in the U.S. The Expectation: A layered defense from

SOC CATCH
Compliance Networking Cybersecurity

Bloatware on a New Laptop

The Network: Legal firm with hundreds of attorneys, dozens of offices The Expectation: Brand new laptops are clean, they get infected

SOC CATCH
Compliance Networking Cybersecurity

Bogus Account Creation as a Backdoor

The Network: A financial firm headquartered in the U.S. East Coast with several hundred servers and workstations. The Expectation...

SOC CATCH
Compliance Networking Cybersecurity

Browser Hijacking

The Network: A Bank serving multiple states on the U.S. East Coast with a HQ and several dozen branch offices; 500+

SOC CATCH
Compliance Networking Cybersecurity

Brute Force SSH Attack

The Network: An energy cooperative with multiple datacenters and hundreds of servers. The Expectation: The network design is thoughtfully...

SOC CATCH
Compliance Networking Cybersecurity

Convenience is the Enemy of Security

The Network: A government contractor on the U.S. East Coast with 250+ servers and 100+ workstations. The Expectation: System...

SOC CATCH
Compliance Networking Cybersecurity

Defrag an SSD, a bad thing?

The Network: U.S. East Coast data center of a nationwide retailer. Its up-to-date equipment includes a significant investment in Solid State

SOC CATCH
Compliance Networking Cybersecurity

Domain Login Introduces Insecurity

The Network: A business school with 3,000 students in New England; 200+ servers and 500+ workstations. Microsoft Windows is the dominant

SOC CATCH
Compliance Networking Cybersecurity

Drive by attack using Java

The Network: A financial firm headquartered in the Midwest U.S. with several hundred servers and workstations. The Expectation: Critical...

SOC CATCH
Compliance Networking Cybersecurity

Exploit of Remote access

The Network: Healthcare organization, dozens of servers, several hundred workstations The Expectation: Lean in house IT staff...

SOC CATCH
Compliance Networking Cybersecurity

Honey I blew up the hard drive

The Network: An Electric Cooperative in the US Midwest with 50+ servers and 100+ workstations The Expectation: All servers have sufficient

SOC CATCH
Compliance Networking Cybersecurity

Honeypot deceives attacker trying to exploit Apache Struts Vulnerability

The Network: A technology provider with an on-site IT team. The EventTracker SIEM service supplements this team.

SOC CATCH
Compliance Networking Cybersecurity

Illegal Access to Expensive Library Resources

The Network: A mid-sized state university with multiple locations and 30,000 students. The Expectation: The university library subscribes...

SOC CATCH
Compliance Networking Cybersecurity

Nosy Admin Snoops Managing Partners Email

The Network: A law firm headquartered in the U.S. East Coast with a dozen offices worldwide. The Expectation: Email is the

SOC CATCH
Compliance Networking Cybersecurity

Phishing attack via bogus Dropbox Login page

The Network: A financial firm headquartered in the Midwest U.S. with several hundred servers and workstations. The Expectation...

SOC CATCH
Compliance Networking Cybersecurity

Ransomware Persists

The Network: Central Bank of a nation that sets fiscal policy. There are hundreds of servers and thousands of workstations. They

SOC CATCH
Compliance Networking Cybersecurity

Rogue Contractor Exposes Financial Organization

The Network: A financial services firm headquartered on the U.S. East Coast with several hundred servers and workstations.

SOC CATCH
Compliance Networking Cybersecurity

Services Tied to Disabled Account

The Network: A non-profit corporation that operates dozens of hospitals and ancillary care facilities in 17 states. The Expectation...

SOC CATCH
Compliance Networking Cybersecurity

The Clickjacked Website

The Network: A high technology provider on the US East Coast with several hundred servers, including internal webservers and a popular

SOC CATCH
Compliance Networking Cybersecurity

The Executive Bully

The Network: HQ location of nationwide retail chain The Expectation: Higher up’s set an example for the rest of us The

SOC CATCH
Compliance Networking Cybersecurity

The Guest WiFi

The Network: Multi location retail store chain The Expectation: Customers can be provided guest WiFi; it encourages longer stays in-store...

SOC CATCH
Compliance Networking Cybersecurity

The Over Confident Tech

The Network: High tech provider of services The Expectation: Users with IT admin skills are more careful than the average user

SOC CATCH
Compliance Networking Cybersecurity

The Remote Access Misconfiguration

The Network: Multi state Electricity provider The Expectation: When IT makes changes, they are done right The Catch: Remote Desktop Protocol

SOC CATCH
Compliance Networking Cybersecurity

The Smartphone Password Update

The Network: Financial institution The Expectation: Providing access to email via personal or company provided smartphones boosts...

SOC CATCH
Compliance Networking Cybersecurity

Troubleshooting Causes Trouble

The Network: A manufacturing facility in the US East Coast with 50+ servers and 100+ workstations The Expectation: User logins fire

SOC CATCH
Compliance Networking Cybersecurity

Unexpected USB drive activity

The Network: Midwest US banking institution, hundreds of servers and thousands of workstations The Expectation: All USB storage devices...

SOC CATCH
Compliance Networking Cybersecurity

Vendor-created backdoor

The Network: A multi-state retailer with 100+ stores on the US East Coast; 400+ servers. The Expectation: Business functions require that

SOC CATCH
Compliance Networking Cybersecurity

VPN Access Can Be An Attack Vector

The Network: A well known college system with 35+ locations and 30,000 students. The Expectation: Remote access to data center resources

SOC CATCH
Compliance Networking Cybersecurity

Why HTTPS matters

The Network: A nationwide health insurance provider The Expectation: The health insurance provider uses an antivirus that provides...

ARTICLE
Compliance Networking Cybersecurity

Malware, Ransomware, and the Next Big Threat

Imagine the lost revenue for a major retailer if they needed to shut down all of their stores for a few days, or even a few hours...

ARTICLE
Compliance Networking Cybersecurity

Equifax’s enduring lesson — perfect protection is not practical

Equifax, one of the big-three US credit bureaus, disclosed a major data breach. It affects 143 million individuals — mostly...

ARTICLE
Compliance Networking Cybersecurity

Three critical advantages of EventTracker Essentials

By now it’s accepted that SIEM is a foundational technology for both securing a network from threats as well as demonstrating...

ARTICLE
Compliance Networking Cybersecurity

Three paradoxes disrupting IT Security

2017 has been a banner year for IT Security. The massive publicity of attacks like WannaCry have focused public attention like never...

ARTICLE
Compliance Networking Cybersecurity

Think you are too small to be hacked?

Why has ransomware exploded on to the scene in 2017? Because it works.

ARTICLE
Compliance Networking Cybersecurity

How do you determine IT security risk?

How much security is enough? That’s a hard question to answer. You could spend $1 or $1M on security and still ask the same...

ARTICLE
Compliance Networking Cybersecurity

Protect Your Back-to-School Sales From POS Ransomware

Security experts believe that cybercriminals will be shifting tactics due to declining revenues from stolen credit card sales. We discuss...

VIDEO
Compliance Networking Cybersecurity

POS Ransomware - Imagine the Impact

What can be done to truly protect a business? Go beyond bare-bones security regulatory compliance by implementing security measures to...

ARTICLE
Compliance Networking Cybersecurity

Ransomware's Next Move

While IT security teams identify, hunt, and remove specific variants of the ransomware, there may already be unknown mutated varieties...

WHITEPAPER
Compliance Networking Cybersecurity

POS Ransomware

An ounce of prevention is worth a pound of cure. Except in business, where an ounce of prevention can be worth several million dollars...

ARTICLE
Compliance Networking Cybersecurity

Protecting Against Ransomware Attacks: What Every Business Needs to Know

Ransomware attack frequency is at its height as there have been more than 4,000 ransomware attacks happening each day for over a year now...

ARTICLE
Compliance Networking Cybersecurity

Yet Another Ransomware That Can be Immediately Detected with Process Tracking on Workstations

As I write this, yet another ransomware attack is underway. This time it’s called Petya, and it again uses SMB to spread. But here...

INFOGRAPHIC
Compliance Networking Cybersecurity

Top 10 Hotel Breaches & Lessons Learned

We're counting down the top hotel POS data breaches of all-time...and the lessons we have learned from them.

ARTICLE
Compliance Networking Cybersecurity

Petya Ransomware – What it is and what to do

A new ransomware variant is sweeping across the globe known as Petya. It is currently having an impact on a wide range of industries and...

ARTICLE
Compliance Networking Cybersecurity

The Top Five Cyber Threats Hotel Brands and Franchisees Need to Know About

While automation facilitates hotel operations and often makes a better stay for guests, it also opens hotels to digital threats...

PAGE
Compliance Networking Cybersecurity

Are you Prepared for Retail Ransomware?

With stolen credit card data value on the decline in the black market, and the continued rise of ransomware attacks, retailers are...

ARTICLE
Compliance Networking Cybersecurity

Perfect protection is not practical

With distressing regularity, new breaches continue to make headlines. The biggest companies, the largest institutions both private and...

VIDEO
Compliance Networking Cybersecurity

WannaCry Ransomware Webinar

Is it over? Will it happen again? - How it spreads - What it does - Technical details - What Netsurion, through our SIEM-at-the-Edge...

ARTICLE
Compliance Networking Cybersecurity

Tips for Protecting Information While on the Go: What Summer Travelers Need to Know About Security

As the summer travel season quickly approaches, most people envision exchanging work clothes and school books for shorts, flip flops, and...

ARTICLE
Compliance Networking Cybersecurity

Protect Your Business from Ransomware

As the second iteration of the WannaCry ransomware impacting IT infrastructure around the globe is expected, we want to arm our customers...

ARTICLE
Compliance Networking Cybersecurity

Challenges with Threat Intelligence or why a Honeynet is a good idea

Shared threat intelligence is an attractive concept. The good guys share experiences about what the bad guys are doing thereby blunting...

ARTICLE
Compliance Networking Cybersecurity

Tips for Choosing the Right POS Provider: What a small business owner needs to know

As a new business owner, there is so much to be proud of and so much to do. Your idea turned into a plan that has been put to action, so...

ARTICLE
Compliance Networking Cybersecurity

When a SIEM is Like an Exercise Machine Stuck Behind the Junk in Your Garage

I’m a big believer in security analytics and detective controls in general.  At least sometimes, bad guys are going to evade...

ARTICLE
Compliance Networking Cybersecurity

5 Security Tips for Small and Multi-location Tax and Accounting Firms: Tax Season and Beyond

Tax season is a busy time of year for hackers, given the ample opportunities to steal personal and financial information through phishing...

ARTICLE
Compliance Networking Cybersecurity

Essential soft skills for cybersecurity success

IT workers in general, but more so IT Security professionals, pride themselves on their technical skills. Keeping abreast of the latest...

INFOGRAPHIC
Compliance Networking Cybersecurity

How Strong Are Your Passwords?

How Strong Are Your Passwords? Netsurion tips to keep you and your business protected.

VIDEO
Compliance Networking Cybersecurity

Advanced Threat Protection for SMBs

Learn why firewalls, anti-virus, and anti-malware alone may not be enough to secure your business from the ever-evolving threat landscape...

ARTICLE
Compliance Networking Cybersecurity

Who suffers more - cybercrime victims or cybersecurity professionals?

So you got hit by a data breach, an all too common occurrence in today’s security environment. Who gets hit? Odds are you will say...

ARTICLE
Compliance Networking Cybersecurity

Top three high risk behaviors that compromise IT Security

The insider threat is typically much more infrequent than external attacks, but they usually pose a much higher severity of risk for...

ARTICLE
Compliance Networking Cybersecurity

The Top Five Threats That Restaurant Franchisees Need to Know About

Restaurants with multiple locations are taxed with increased pressure to succeed in different geographic locations, with potentially...

ARTICLE
Compliance Networking Cybersecurity

Ransomware is only getting started

Ransomware is about denying you access to your data via encryption. But that denial has to be of a great enough magnitude create...

ARTICLE
Compliance Networking Cybersecurity

Foster a Healthy Security Posture

Securing medical records is a complex undertaking. Healthcare organizations need an array of security technologies that can be used to...

VIDEO
Compliance Networking Cybersecurity

Creating a Healthcare Cybersecurity Battle Plan

A good security plan can be overwhelming at first, but with the right knowledge and expertise, it can be simplified and managed. On this...

ARTICLE
Compliance Networking Cybersecurity

EventTracker Enterprise and the Cyber Kill Chain

Defense strategies that focus exclusively on the perimeter and on prevention do not take into account the kill chain life cycle approach;...

ARTICLE
Compliance Networking Cybersecurity

Your Voice for SMB Compliance Pains

We believe that every business should have the means to protect themselves and their customers from cyberattacks, and the PCI Security...

ARTICLE
Compliance Networking Cybersecurity

‘Twas the Night Before Christmas – an EventTracker Story

‘Twas the night before Christmas and all through HQ Not a creature was stirring, except greedy Lou – An insider thief who had...

ARTICLE
Compliance Networking Cybersecurity

Compliance is not a proxy for due care

Regulatory compliance is a necessary step for IT leaders, but it’s not sufficient enough to reduce residual IT security...

ARTICLE
Compliance Networking Cybersecurity

May Your Holidays be Merry, Bright, and Hack Free: Security Tips for the Biggest Shopping Season

Though there are many companies out there responsible for securing merchant locations from the risks of data breaches, people’s own...

ARTICLE
Compliance Networking Cybersecurity

Serving up Security: What Restaurants Need to Know about Breach Risks and Prevention

Sure, the headlines have been wrought with healthcare ransomware stories, election-centric email breaches, and massive retail hacks&mdash...

ARTICLE
Compliance Networking Cybersecurity

Work Smarter – Not Harder: Use Internal Honeynets to Detect Bad Guys Instead of Just Chasing...

Log collection, SIEM and security monitoring are the journey not the destination.  Unfortunately, the destination is often a false...

ARTICLE
Compliance Networking Cybersecurity

How To Make Cybersecurity Great Again: Guidance For President-Elect Donald Trump

Are you feverishly working to patch your systems today with the latest available patches? Or are you spending your time unfriending...

ARTICLE
Compliance Networking Cybersecurity

Top three reasons SIEM solutions fail

We have been implementing Security Information and Event Management (SIEM) solutions for more than 10 years. We serve hundreds of active...

ARTICLE
Compliance Networking Cybersecurity

How the EventTracker/Netsurion merger will bring you more powerful cybersecurity solutions

We are delighted that EventTracker is now part of the Netsurion family. On October 13, 2016 we announced our merger with managed security...

ARTICLE
Compliance Networking Cybersecurity

A Day in the Life of a Consumer

Years ago, in a data security nightmare not so far away…I found out how quickly a brand could change from being a favorite of mine...

ARTICLE
Compliance Networking Cybersecurity

Tracking Physical Presence with the Windows Security Log

How do you figure out when someone was actually logged onto their PC? The data is there in the security log, but it’s so much...

ARTICLE
Compliance Networking Cybersecurity

Key takeaways from the presidential debate on cybersecurity.

​The presidential debate, as entertaining as it was for many, was a great place to hear about the focus needed on cybersecurity issues in...

ARTICLE
Compliance Networking Cybersecurity

IT Service Providers: Mind the Security Gap

Persistent threats affecting businesses of all sizes and in all verticals are becoming more consistent and hitting more frequently. The...

ARTICLE
Compliance Networking Cybersecurity

Are there any weaknesses in your Point-of-Sale System?

News about a company being breached seems to be a regular occurrence nowadays. And it’s no...

ARTICLE
Compliance Networking Cybersecurity

Demystifying PCI Compliance

PCI compliance: that daunting phrase you always hear in the world of payments…but never truly...

ARTICLE
Compliance Networking Cybersecurity

What is privilege escalation and why should you care?

A common hacking method is to steal information by first gaining lower-level access to your network. This can happen in a variety of ways...

ARTICLE
Compliance Networking Cybersecurity

Monitoring DNS Traffic for Security Threats

Cyber criminals are constantly developing increasingly sophisticated and dangerous malware programs. Statistics for the first quarter of...

ARTICLE
Compliance Networking Cybersecurity

RetailNOW Recap 2016: Security Top of Mind for Attendees

The event, aimed at connecting the point-of-sale (POS) technology ecosystem, was extremely successful...

ARTICLE
Compliance Networking Cybersecurity

How to control and detect users logging onto unauthorized computers

Windows gives you several ways to control which computers can be logged onto with a given account.  Leveraging these features is a...

ARTICLE
Compliance Networking Cybersecurity

POS VARs - Don’t be a Target!

When business owners start looking at Point-of-Sale (POS) systems, they may feel overwhelmed at the...

ARTICLE
Compliance Networking Cybersecurity

Is your brand truly secured?

So you have a big brand name that millions of consumers trust. You have hundreds to thousands of...

ARTICLE
Compliance Networking Cybersecurity

7 ways you can prevent credit card fraud when shopping!

We know how tempting those summer sales are! But are you being careful on where you are swiping your card?

ARTICLE
Compliance Networking Cybersecurity

Idea to retire: Do more with less

Ideas to Retire is a TechTank series of blog posts that identify outdated practices in public sector IT management and suggest new ideas...

ARTICLE
Compliance Networking Cybersecurity

Detect Persistent Threats on a Budget

There’s a wealth of intelligence available in your DNS logs that can help you detect persistent threats. So how can you use them to...

ARTICLE
Compliance Networking Cybersecurity

Do you know where your data is?

In this fifth article of the series, we continue to explore the basic ways businesses can keep their networks safer. These include tools...

ARTICLE
Compliance Networking Cybersecurity

Dirty truths your SIEM vendor won’t tell you

Analytics is an essential component of a modern SIEM solution. The ability to crunch large volumes of log and security data in order to...

ARTICLE
Compliance Networking Cybersecurity

Are you guilty of any of these PCI myths?

We have gathered what have been common comments that we hear from business owners. And today, we would like to bust these myths!

ARTICLE
Compliance Networking Cybersecurity

Should I be doing EDR? Why isn’t anti-virus enough anymore?

Detecting virus signatures is so last year. Creating a virus with a unique signature or hash is quite literally child’s play, and...

ARTICLE
Compliance Networking Cybersecurity

What you should know about programs, ports and services

In this fourth article in the series, we continue to explore some of the basic ways that business of all sizes can keep their computer...

ARTICLE
Compliance Networking Cybersecurity

Uncover C&C traffic to nip malware

In a recent webinar, we demonstrated techniques by which EventTracker monitors DNS logs to uncover attempts by malware to communicate...

ARTICLE
Compliance Networking Cybersecurity

7 things you need to know about Anti-Virus protection.

In this entry we discuss the topic of anti-virus protection. There are many questions that come up when we talk about this topic. So here...

ARTICLE
Compliance Networking Cybersecurity

The Perils of Using Remote Access Software

While software that can be installed on your PC and used to remotely connect when you are away from your home office can be very handy...

ARTICLE
Compliance Networking Cybersecurity

Maximize your SIEM ROI

Far too many SIEM implementations are considered to be catastrophes. Having implemented hundreds of such projects, here are the three...

ARTICLE
Compliance Networking Cybersecurity

Why is patching important to the security of your business?

If you are not keeping up with regular patching of your computer and the programs that run on it – then you are simply asking for...

ARTICLE
Compliance Networking Cybersecurity

Detecting Ransomware: The Same as Detecting Any Kind of Malware?

Ransomware burst onto the scene with high profile attacks against hospitals, law firms and other organizations.  What is it and how...

ARTICLE
Compliance Networking Cybersecurity

Protecting your business from hacker’s attacks.

2016 Verizon Breach Investigations Report (Part 3 of 3)
We've covered the 4 patterns of attack used by hackers, expanded on...

ARTICLE
Compliance Networking Cybersecurity

What tools are hackers using to access businesses’ networks?

2016 Verizon Breach Investigations Report (Part 2 of 3)
In our previous post we showed you that regardless of the business&rsquo...

ARTICLE
Compliance Networking Cybersecurity

Research points to SIEM-as-a-Service

SC Magazine released the results of a research survey focused on the rising acceptance of SIEM-as-a-Service for the small and medium...

ARTICLE
Compliance Networking Cybersecurity

Is your business at risk of a data breach?

2016 Verizon Breach Investigations Report (Part 1 of 3)
The 80 page report is packed with valuable data breach insights. We know...

ARTICLE
Compliance Networking Cybersecurity

No Business is Too Small for Hackers!

It's National Small Business Week! Let's celebrate the hard work you do and make sure your...

ARTICLE
Compliance Networking Cybersecurity

What you should know about PCI DSS 3.2

PCI DSS 3.2 is scheduled for release at the end of April. Have you thought about how this update can affect your business? Will you still...

ARTICLE
Compliance Networking Cybersecurity

Welcome to the New Security World of SMB Partners

Yet another recent report confirms the obvious, that SMBs in general do not take security seriously enough. The truth is a bit more...

ARTICLE
Compliance Networking Cybersecurity

Your Best Defense Against Ransomware Might Be Your Employees

While your business’ data security program should consist of many components, perhaps the most effective defense to ransomware is...

ARTICLE
Compliance Networking Cybersecurity

Top 3 traits of a successful Security Operations Center

Traditional areas of risk — financial risk, operational risk, geopolitical risk, risk of natural disasters — have been part...

ARTICLE
Compliance Networking Cybersecurity

Just how dangerous is ransomware?

Ransomware is a business’ worst nightmare. This malware infects computers and restricts the users from accessing any of their data...

ARTICLE
Compliance Networking Cybersecurity

Is the IT Organizational Matrix an IT Security Problem?

Do you embrace the matrix? The fact is, once networks get to a certain size, IT organizations begin to specialize and small kingdoms emerge.

ARTICLE
Compliance Networking Cybersecurity

Cloud Security Starts at Home

Cloud security is getting attention and that’s as it should be.  But before you get hung up on techie security details, like...

ARTICLE
Compliance Networking Cybersecurity

Last Year's Cyber Attack Trends — This Year's Implications

The range of threats included trojans, worms, trojan downloaders and droppers, exploits and bots (backdoor trojans), among others. When...

ARTICLE
Compliance Networking Cybersecurity

Hungry…Hungry…HIPAA

I have fond memories of playing a board game called Hungry Hungry Hippos in my younger days. Today’s medical practices mirror the...

ARTICLE
Compliance Networking Cybersecurity

Mobile Tech in Healthcare Can Put Your Practice at Risk

While you focus on providing the best health service for your patients, it is easy to under-estimate the risks that you may be putting...

ARTICLE
Compliance Networking Cybersecurity

Certificates and Digitally Signed Applications: A Double Edged Sword

Windows supports the digitally signing of EXEs and other application files so that you can verify the provenance of software before it...

ARTICLE
Compliance Networking Cybersecurity

Top 5 SIEM complaints

Here’s our list of the Top 5 SIEM complaints:1) We bought a security information and event management (SIEM) system, but it...

ARTICLE
Compliance Networking Cybersecurity

The Cost of False IT Security Alarms

Think about the burglar alarm systems that are common in residential neighborhoods. In the eye of the passive observer, an alarm system...

ARTICLE
Compliance Networking Cybersecurity

SIEM: Sprint or Marathon?

Winning a marathon requires dedication and preparation. Over long periods of time. A sprint requires intense energy but for a short...

ARTICLE
Compliance Networking Cybersecurity

Pain-Free Data Security for Medical Offices

It’s understandable that the primary goal of any healthcare practice is to keep their patients healthy and safe. But what about...

ARTICLE
Compliance Networking Cybersecurity

The Assume Breach Paradigm

Given today’s threat landscape, let’s acknowledge that a breach has either already occurred within our network or that it...

ARTICLE
Compliance Networking Cybersecurity

2015: “The Year of the Healthcare Hack"

2015 was a tough year for the healthcare industry. Some are even calling 2015 “the year of...

ARTICLE
Compliance Networking Cybersecurity

SIEM and Return on Security Investment (RoSI)

The traditional method for calculating standard Return on Investment (RoI) is that it equals the gain minus the cost, divided by the...

ARTICLE
Compliance Networking Cybersecurity

Shoppers Care If You've Been Breached!

It’s the holiday season and for many that means shopping season! But it also means that theft increases, whether it is physical...

ARTICLE
Compliance Networking Cybersecurity

Diagnosing Account Lockout in Active Directory

Here we are going to look for Event ID 4740. This is the security event that is logged whenever an account gets locked. “User X...

ARTICLE
Compliance Networking Cybersecurity

Why Do Hackers Want Your Medical Records

2015 has been a year of healthcare data breaches. But why are hackers going after healthcare records now?

ARTICLE
Compliance Networking Cybersecurity

6 Safe Computing Tips to Help Retailers Fight Off Hackers

Many small businesses believe only the "big guys" will suffer a data breach. But did you know that 90% of data breaches impact...

ARTICLE
Compliance Networking Cybersecurity

Cybersecurity Professionals

As data breaches occur more and more, it is no secret that the market needs more cybersecurity professionals. Here are a few statistics...

ARTICLE
Compliance Networking Cybersecurity

Security Subsistence Syndrome

Security Subsistence Syndrome (SSS) is defined as a mindset in an organization that believes it has no security choices and is...

ARTICLE
Compliance Networking Cybersecurity

The Evolution of the Hacker

Technology keeps improving, as do hackers. Hackers have been around for years and years; from exploiting the vulnerabilities of telephone...

ARTICLE
Compliance Networking Cybersecurity

Catching Hackers Living off the Land Requires More than Just Logs

If attackers can deploy a remote administration tool (RAT) on your network, it makes it so much easier for them. RATs make it luxurious...

ARTICLE
Compliance Networking Cybersecurity

The Ten Steps Post Data Breach

Nearly 60% of businesses have experienced a breach in the last two years. Have you ever considered what would happen if your business was...

ARTICLE
Compliance Networking Cybersecurity

When is an alert not an alert?

EventTracker users know that one of its primary functions is to apply built-in knowledge to reduce the flood of all security/log data to...

ARTICLE
Compliance Networking Cybersecurity

The Transition to EMV Isn't Over

Merchants know by now that after October 1st the liability for card-present fraud will shift to whichever party is the least EMV...

ARTICLE
Compliance Networking Cybersecurity

How Strong Are Your Passwords? Tips To Keep You Protected

Passwords keep your accounts and network safe but may also be a gateway for hackers. Here are some quick tips we recommend when creating...

ARTICLE
Compliance Networking Cybersecurity

How to Detect Low Level Permission Changes in Active Directory

We hear a lot about tracking privileged access today because privileged users like Domain Admins can do a lot of damage. But more...

ARTICLE
Compliance Networking Cybersecurity

Find Out Who Is Affected By A Data Breach?

The number of data breaches continues to increase. Cybercrime affects your brand, your customers and your employees in ways that are...

ARTICLE
Compliance Networking Cybersecurity

Healthcare Practices are at Particularly High Risk of Data Breach

The CDC estimates that close to 80% of office-based physicians use some form of electronic medical records. This increase, coupled with...

ARTICLE
Compliance Networking Cybersecurity

The Impact Of A Data Breach

What is the true cost of a data breach? A data breach affects your business, brand, and reputation. But it can be prevented.

ARTICLE
Compliance Networking Cybersecurity

4 Common Data Threats Every Business Needs to Be Aware Of

Four Common Data Threats

ARTICLE
Compliance Networking Cybersecurity

Three Indicators of Attack

For many years now, the security industry has become somewhat reliant on ‘indicators of compromise’ (IoC) to act as clues...

ARTICLE
Compliance Networking Cybersecurity

Are You Listening to Your Endpoints?

There’s plenty of interest in all kinds of advanced security technologies like threat intelligence, strong/dynamic authentication...

ARTICLE
Compliance Networking Cybersecurity

The Detection Deficit

The gap between the ‘time to compromise’ and the ‘time to discover’ is the detection deficit. According to...

ARTICLE
Compliance Networking Cybersecurity

Netsurion Defense Against Backoff

In the wake of BackOff, and numerous other data breaches, consumers are demanding answers into the how and why surrounding companies who...

ARTICLE
Compliance Networking Cybersecurity

User Location Affinity

It’s clear that we are now working under the assumption of a breach. The challenge is to find the attacker before they cause damage...

ARTICLE
Compliance Networking Cybersecurity

Wireless Security for Business

In today’s business world, a major draw for many customers is the ability to stay connected while outside the office. In order to...

ARTICLE
Compliance Networking Cybersecurity

How to shoot yourself in the foot with SIEM

Six ways to shoot yourself with SIEM technology: 1) Dont plan; just jump in 2) Have no defined scope or use cases; whatever 3) Confuse...

ARTICLE
Compliance Networking Cybersecurity

Five quick wins to reduce exposure to insider threats

A data breach has serious consequences both directly and indirectly. Lost revenue and a tarnished brand reputation both inflict harm...

ARTICLE
Compliance Networking Cybersecurity

Secure, Usable, Cheap: Pick any two

This fundamental tradeoff between security, usability, and cost is critical. Yes, it is possible to have both security and usability...

ARTICLE
Compliance Networking Cybersecurity

Six Simple Rules For Safe Credit Card Handling

It is becoming more and more frequent to read about electronic data breaches in the news these days. Unfortunately, what is not touched...

ARTICLE
Compliance Networking Cybersecurity

Four Key Steps to Rapid Incident Response

Is it possible to avoid security breaches? Judging from recent headlines, probably not. Victims range from startups like Kreditech, to...

ARTICLE
Compliance Networking Cybersecurity

Death by a Thousand cuts

You may recall that back in 2012, then Secretary of Defense Leon Panetta warned of “a cyber Pearl Harbor; an attack that would...

ARTICLE
Compliance Networking Cybersecurity

Enriching Event Log Monitoring by Correlating Non Event Security Information

Sometimes we get hung up on event monitoring and forget about the “I” in SIEM which stands for information. Not forgetting...

ARTICLE
Compliance Networking Cybersecurity

Make Your Wireless Work For You

Whether we are talking about shoppers being students, families, or business execs, having the ability to interact with your guests via...

ARTICLE
Compliance Networking Cybersecurity

The Pyramid of Pain

There is great excitement amongst security technology and service providers about the intersection of global threat intelligence with...

ARTICLE
Compliance Networking Cybersecurity

Every Merchant Needs Electronic Data Protection

How many days go by between news stories involving computer breaches? The truth of the matter is that as long as sensitive data is...

ARTICLE
Compliance Networking Cybersecurity

What good is Threat Intelligence integration in a SIEM?

Bad actors/actions are more and more prevalent on the Internet. Who are they? What are they up to? Are they prowling in your network...

ARTICLE
Compliance Networking Cybersecurity

Why Naming Conventions are Important to Log Monitoring

Log monitoring is difficult for many reasons. For one thing there are not many events that unquestionably indicate an intrusion or...

ARTICLE
Compliance Networking Cybersecurity

Why Risk Classification is Important

Traditional threat models posit that it is necessary to protect against all attacks. While this may be true for a critical national...

ARTICLE
Compliance Networking Cybersecurity

State Sponsored Hacking – More Than an Issue for Sony

We live in a brave new world where the spies of yesteryear, like James Bond and Jason Bourne, are truly falling away into the realm of...

ARTICLE
Compliance Networking Cybersecurity

How many people does it take to run a SIEM?

You must have a heard light bulb jokes, for example: How many optimists does it take to screw in a light bulb? None, they’re...

ARTICLE
Compliance Networking Cybersecurity

Five Steps to Protect Retailers from Credit Card Theft

The Georgia based fast food company, Chick-fil-A, has confirmed that it is investigating a potential credit card breach. The...

ARTICLE
Compliance Networking Cybersecurity

Are honeypots illegal?

In computer terminology, a honeypot is a computer system set to detect, deflect, or, in some manner, counteract attempts at...

ARTICLE
Compliance Networking Cybersecurity

Backoff Has Been Upgraded Harder to Detect

So when you are a hacker and you write the most successful financial transaction hacking software in history, what do you do next? Well...

ARTICLE
Compliance Networking Cybersecurity

Three key advantages for SIEM-As-A-Service

Security Information and Event Management (SIEM) technology is an essential component in a modern defense-in-depth strategy for IT...

ARTICLE
Compliance Networking Cybersecurity

IT Community Shaken By Shellshock Vulnerabilities

In the wake of Heartbleed, comes a new form of exposure that could potentially do much more damage than any other vulnerability of its...

ARTICLE
Compliance Networking Cybersecurity

Top 5 Linux log file groups in/var/log

If you manage any Linux machines, it is essential that you know where the log files are located, and what is contained in them. From a...

ARTICLE
Compliance Networking Cybersecurity

PCI 3.0 – A Wake Up Call for SAQ C Merchants

Most merchants who have been validating their PCI compliance for a few years now probably know which SAQ type applies to them. In PCI 2.0...

ARTICLE
Compliance Networking Cybersecurity

Backoff Is the New Standard by Which Other Malware Will Be Judged

Every now and then hackers develop a piece of malware that is so insidious that it changes the landscape of computer security and...

ARTICLE
Compliance Networking Cybersecurity

Case of the Disappearing Objects: How to Audit Who Deleted What in Active Directory

I often get asked how to audit the deletion of objects in Active Directory. It’s pretty easy to do this with the Windows Security...

ARTICLE
Compliance Networking Cybersecurity

SIEM and Return on Investment: Four Pillars for Success

Return on investment (ROI) - it is the Achilles heel of IT management. Nobody minds spending money to avoid costs, prevent disasters, and...

ARTICLE
Compliance Networking Cybersecurity

The 5 stages of SIEM Implementation

Are you familiar with the Kübler-Ross 5 Stages of Grief model? SIEM implementation (and indeed most enterprise software...

ARTICLE
Compliance Networking Cybersecurity

Top 6 uses for SIEM

Security Information and Event Management (SIEM) is a term coined by Gartner in 2005 to describe technology used to monitor and help...

ARTICLE
Compliance Networking Cybersecurity

How to analyze login and pre-authentication failures for Windows Server 2003 R2 and below

Analyzing all the login and pre-authentication failures within your organization can be tedious. There are thousands of login failures...

ARTICLE
Compliance Networking Cybersecurity

Netsurion services and OpenSSL the Heartbleed issue

Many of our customers and resellers have asked how Heartbleed affected Netsurion services. In a nutshell, the managed services that make...

ARTICLE
Compliance Networking Cybersecurity

Will CIOs Be the Final Victim After a Breach

In the wake of their breach, Target announced on March 5, 2014 that their CIO, Beth Jacob was announcing her resignation. This begs the...

ARTICLE
Compliance Networking Cybersecurity

Monitoring File Permission Changes with the Windows Security Log

Unstructured data access governance is a big compliance concern.  Unstructured data is difficult to secure because there’s so...

ARTICLE
Compliance Networking Cybersecurity

There Is No Honor Among Thieves – Target Could Take Advantage of This

For the past several months, there have been numerous stories about major retailers that have been breached by hackers. The result is...

ARTICLE
Compliance Networking Cybersecurity

About the PCI Security Standards Council

The PCI Security Standards Council is an open global forum, launched in 2006, that is responsible for the development, management...

ARTICLE
Compliance Networking Cybersecurity

Looking back: Operation Buckshot Yankee & agent.btz

It was the fall of 2008. A variant of a three year old relatively benign worm began infecting U.S. military networks via thumb drives.

ARTICLE
Compliance Networking Cybersecurity

Target Has A Bullseye On Its Chest

When Target announced that it had suffered a major breach of approximately 40 million credit cards and 70 million customer records, the...

ARTICLE
Compliance Networking Cybersecurity

Why Comply with PCI Security Standards

Why should you, as a merchant, comply with the PCI Security Standards? At first glance, especially if you are a smaller organization, it...

ARTICLE
Compliance Networking Cybersecurity

Christmas-Kids and Hackers Love This Time of Year

When people think of Christmas, most of them imagine family gatherings and good times. We often forget that from the end of Thanksgiving...

ARTICLE
Compliance Networking Cybersecurity

Auditing File Shares with the Windows Security Log

Over the years, security admins have repeatedly asked me how to audit file shares in Windows.  Until Windows Server 2008, there were...

ARTICLE
Compliance Networking Cybersecurity

Thieves Tried to Steal Credit Cards from Nordstrom

The department store giant garnered unwanted attention earlier this month when they announced that a Florida store fell victim to a team...

ARTICLE
Compliance Networking Cybersecurity

PCI 3.0 Is Coming - Are You Ready?

Every 3 years the Payment Card Industry Data Security Standard (PCI) is updated to a new version. The time for the next release is right...

ARTICLE
Compliance Networking Cybersecurity

Can Your Point of Sale Be Compliant after the End of Microsoft XP?

From a PCI compliance standpoint, merchants using Windows XP will have problems maintaining compliance...

ARTICLE
Compliance Networking Cybersecurity

Does Your Call for Help Bring Hackers to Your Door?

There is a new trend facing people who rely on help desks. Hackers are targeting help desks because they know that the people who provide...

ARTICLE
Compliance Networking Cybersecurity

Following a User’s Logon Tracks throughout the Windows Domain

What security events get logged when a user logs on to their workstation with a domain account and proceeds to run local applications and...

ARTICLE
Compliance Networking Cybersecurity

What did Ben Franklin really mean?

In the aftermath of the disclosure of the NSA program called PRISM by Edward Snowden to a reporter at The Guardian...

ARTICLE
Compliance Networking Cybersecurity

Balancing Privacy and Security

In the wake of the most recent terrorist bombing in Boston, it is easy to understand why some people...

ARTICLE
Compliance Networking Cybersecurity

Square Cash - A Money Transfer Game Changer?

Square strives to make financial transactions simple enough so that the average person on the street...

ARTICLE
Compliance Networking Cybersecurity

Using Dynamic Audit Policy to Detect Unauthorized File Access

One thing I always wished you could do in Windows auditing was mandate that access to an object be audited if the user was NOT a member...

ARTICLE
Compliance Networking Cybersecurity

Internet Explorer 8 - People Still Love It, But There’s a Problem

This type of issue with a browser is so damaging because computer hackers who take advantage of it...

ARTICLE
Compliance Networking Cybersecurity

Hackers May Just Look to Embarrass You

When you think about electronic security, what comes to mind? Do you consider how vulnerable your...

ARTICLE
Compliance Networking Cybersecurity

How to Use Process Tracking Events in the Windows Security Log

I think one of the most underutilized features of Windows Auditing and the Security Log are Process Tracking events. In Windows 2003/XP...

ARTICLE
Compliance Networking Cybersecurity

Universal Plug and Play - New Report on an Old Problem

In the dark ages of personal computers (1980′s and 90′s), you either needed to be a...

ARTICLE
Compliance Networking Cybersecurity

Do Hackers Fear U.S. Jails?

In what should only be considered a victory for the U.S. DOJ, 2 of the 4 alleged Subway hackers responsible for potentially $10 Million...

ARTICLE
Compliance Networking Cybersecurity

Top 4 Security Questions You Can Only Answer with Workstation Logon/Logoff Events

I often encounter a dangerous misconception about the Windows Security Log: the idea that you only need to monitor domain controller...

ARTICLE
Compliance Networking Cybersecurity

Threatscape 2012 – Prevent, Detect, Correct

The past year has been a hair-raising series of IT security breakdowns and headlining events reaching as high as RSA itself falling...

ARTICLE
Compliance Networking Cybersecurity

Subtraction, Multiplication, Division and Task Unification through SIEM and Log Management

When we originally conceived the idea of SIEM and log management solution for IT managers many years ago, it was because of the...

ARTICLE
Compliance Networking Cybersecurity

Virtualization Security What are the Real World Risks

There’s been a lot of recent hype about security risks with the rise of virtualization, but much of it is vague and short on...

ARTICLE
Compliance Networking Cybersecurity

Security Logging as a Detective and Deterrent Control Against Rogue Admins

Intrusion detection and compliance are the focus of log management, SIEM and security logging.  But security logs, when managed...

ARTICLE
Compliance Networking Cybersecurity

Logging for HIPAA Part 2; Secure auditing in Linux

HIPAA Logging HOWTO, Part 2 The Health Insurance Portability and Accountability Act of 1996 (HIPAA) outlines relevant security and...

ARTICLE
Compliance Networking Cybersecurity

Sustainable vs. Situational Values

I am often asked that if Log Management is so important to the modern IT department, then how come more than 80% of the market that...

ARTICLE
Compliance Networking Cybersecurity

Logs vs Bots and Malware Today

Despite the fact that security industry has been fighting malicious software – viruses, worms, spyware, bots and other malware...

ARTICLE
Compliance Networking Cybersecurity

MSSP /SaaS /Cloud Computing – Confused? I know I am

There is a lot of discussion around Security MSSPs, SaaS (Security as a Service) and Cloud Computing these days. I always felt I had a...

ARTICLE
Compliance Networking Cybersecurity

SIEM: Security, Incident AND Event MANAGEMENT, not Monitoring!

Unfortunately, IT is not perfect; nothing in our world can be. Compounding the inevitable failures and weaknesses in any system designed...

ARTICLE
Compliance Networking Cybersecurity

Why are Workstation Security Logs so Important?

No one needs to be convinced that monitoring Domain Controller security logs is important; member servers are equally as important: most...

ARTICLE
Compliance Networking Cybersecurity

The Key Difference between “Account Logon” and “Logon/Logoff” Events in the Windows Security Log

An area of audit logging that is often confusing is the difference between two categories in the Windows security log: Account Logon...

ARTICLE
Compliance Networking Cybersecurity

The Art of Detecting Malicious Activity with Logs

Randy Franklin Smith compares methods for detecting malicious activity from logs including monitoring for high impact changes, setting up...

ARTICLE
Compliance Networking Cybersecurity

Logs for Insider Abuse Investigations

In most previous newsletters, we have discussed the use of logging for various regulatory mandates (such as PCI DSS, HIPAA and FISMA) as...

ARTICLE
Compliance Networking Cybersecurity

Detecting Zeus, Logging for incident response, and more

Preparing the Infrastructure From all the uses for log data across the spectrum of security, compliance, and operations, using logs for...

ARTICLE
Compliance Networking Cybersecurity

5 cyber security myths, the importance of time synchronization, and more

Time won't give me time: The importance of time synchronization for Log Management

ARTICLE
Compliance Networking Cybersecurity

The EPS Myth

Often when I engage with a prospect their first question is “How many events per second (EPS) can EventTracker handle?&rdquo...

ARTICLE
Compliance Networking Cybersecurity

The 5 W’s of Security Management

The 5 W’s of security management I’ve seen it happen about a thousand times if I’ve seen it once. A high profile...

ARTICLE
Compliance Networking Cybersecurity

100 Log Management uses #29 Detecting XSS attacks

The number 1 vulnerability on the OWASP list is cross site scripting or XSS. XSS seems to have replaced SQL injection as the new favorite...

WHITEPAPER
Compliance Networking Cybersecurity

5 Indicators of Endpoint Evil

With so much focus on security these days, it’s easy to imagine that IT departments are winning the battle against malware and...

INFOGRAPHIC
Compliance Networking Cybersecurity

Cyberthreat Defense Report

CyberEdge’s 2022 Cyberthreat Defense Report (CDR) has become the standard for assessing organizations’ security posture, for...

PAGE
Compliance Networking Cybersecurity

Assessments

PAGE
Compliance Networking Cybersecurity

Case Studies

WHITEPAPER
Compliance Networking Cybersecurity

Choosing the Right SIEM

While there is little doubt that SIEM solutions are critical for compliance, security monitoring or IT optimization, it is getting harder...

PAGE
Compliance Networking Cybersecurity

Cybersecurity Convergence Roadshow

WHITEPAPER
Compliance Networking Cybersecurity

Co-sourcing SIEM

When outsourcing isn’t an option but SIEM proficiency is beyond the internal staff ’s expertise, a hybrid approach is...

PAGE
Compliance Networking Cybersecurity

Events

PAGE
Compliance Networking Cybersecurity

Glossary of Terms

WHITEPAPER
Compliance Networking Cybersecurity

Five Code RED Security Threats to Windows Servers

The purpose of this white paper is to identify and demonstrate how to detect five of the most significant security threats. Critical...

PAGE
Compliance Networking Cybersecurity

Infographics

WHITEPAPER
Compliance Networking Cybersecurity

Leveraging Log Management to Provide Business Value

Despite the obvious benefits of Log Management and its increasing recognition as a critical necessity by the IT organization, Log...

WHITEPAPER
Compliance Networking Cybersecurity

Managing Billions of Logs Every Day

This paper highlights the major advantages of employing EventTracker to consolidate, correlate, and manage event log data by discussing...

PAGE
Compliance Networking Cybersecurity

Network & Security Solutions Advisor

Netsurion offers solutions for Network Operations and Security Operations. Individually, they deliver powerful results. Together, they...

WHITEPAPER
Compliance Networking Cybersecurity

Managing The Virtualized Enterprise: New Technology, New Challenges

The benefits of employing virtualization in the corporate data center are compelling - lower operatingcosts, better resource utilization,...

VIDEO
Compliance Networking Cybersecurity

Consolidate Tech Stacks to Reduce Costs and Enhance Security

Frustrated by an ever changing and increasingly complex set of security solutions, mid-market organizations – and the IT service...

WHITEPAPER
Compliance Networking Cybersecurity

Managing USB Mass Storage Devices

This White Paper discusses how you can take advantage of the power of high capacity USB storage devices like thumb/flash drives without...

PAGE
Compliance Networking Cybersecurity

NIST 800-171 Compliant Quiz

The Department of Defense (DoD) is rolling out the CMMC for DoD contractors this year. This means that before bidding on DoD contracts...

PAGE
Compliance Networking Cybersecurity

WHITEPAPER
Compliance Networking Cybersecurity

Monitoring Windows Workstations Seven Important Events

Monitoring event logs from workstations provides two important benefits. Firstly, it saves money by adopting a proactive approach to...

WHITEPAPER
Compliance Networking Cybersecurity

MSP Path to Profit with Managed Security for SMBs

With cyberattacks targeting small- to medium- size businesses (SMBs), MSPs are finding themselves at the crossroads.

PAGE
Compliance Networking Cybersecurity

PAGE
Compliance Networking Cybersecurity

Videos

PAGE
Compliance Networking Cybersecurity

Webcasts and Events

WHITEPAPER
Compliance Networking Cybersecurity

Security Beyond the Windows Event Log

This technical whitepaper describes the ten most critical security conditions that are not monitored by the Windows Operating System or...

PAGE
Compliance Networking Cybersecurity

Whitepapers

WHITEPAPER
Compliance Networking Cybersecurity

Spotting the Adversary with Windows Event Log Monitoring

An introduction to collecting important Windows workstation event logs and storing them in a central location for easier searching and...

VIDEO
Compliance Networking Cybersecurity

Grow your Business with Netsurion: 2021 Partner Program Enhancements and Q&A

Thanks to partners like you, our program has been growing fast each year! This good news brings opportunities to enhance our program for...

WHITEPAPER
Compliance Networking Cybersecurity

Top Ten Insider Threats

With companies making painful personnel and compensation choices in this poor economy, one of the impacts has been an explosion in the...

VIDEO
Compliance Networking Cybersecurity

Insights from the CyberEdge Cyberthreat Defense Report

CyberEdge’s 2022 Cyberthreat Defense Report (CDR) has become the standard for assessing organizations’ security posture, for gauging...

VIDEO
Compliance Networking Cybersecurity

Managed Threat Protection by Netsurion

Netsurion’s Managed Threat Protection solution provides the necessary synergy between people, process, and technology to truly deliver...

VIDEO
Compliance Networking Cybersecurity

Three Things Security Pros Do to Protect Against Ransomware​

Ransomware continues to be the number one resilience threat. It is now a proven market for cyber criminals, generating millions of...

ARTICLE
Compliance Networking Cybersecurity

Restaurant POS Security Implementation Best Practices

The role of the Point-of-Sale (POS) is evolving. In the restaurant industry, it’s important to ask: what does the future of the POS...

This site uses cookies to store information on your computer. Some are essential to make our site work; others help us improve the user experience. By using the site, you consent to the placement of these cookies. Read our Privacy Statement to learn more.

I Accept

Contact Us

  • (713) 929-0200
  • BranchSDO Support
  • EventTracker Support
  • partners@netsurion.com
  • sales@netsurion.com

Partners

  • Partner Program Overview
  • Managed Service Provider Program
  • Partner Portal Login
  • Find a Partner

Quick Links

  • Why Netsurion?
  • Blog
  • Careers
  • Managed Threat Protection
  • Secure Edge Networking

Follow Us:

Stay in the Loop

  • Terms of Use
  • |
  • Privacy Policy
  • |
  • Soc 2 Type 2 Compliant
  • |
  • Descriptions of Services
  • |
  • Contact Us
  • |
  • Sitemap
  • |

Copyright © 2022 Netsurion. All rights reserved.