Powerful threat prediction, prevention, detection, and response along with compliance in a scalable, simple managed solution.
All-in-one networking solution that combines network connectivity, agility, security, and compliance in an affordable managed solution.
Accelerate business growth through our award-winning partner program.
View the latest webcasts, videos, articles, whitepapers, and more.
Faced with rising cybersecurity concerns, MSPs and mid-sized organizations are maturing their security posture beyond a network...
This past year challenged us in novel ways and with dramatic shifts, but it also provided many lessons. While 2021 will provide new...
Many fast casuals managed to pivot quickly in 2020 to a new way of doing business by adding or increasing virtual interactivity, shaking...
To stay secure in the modern connected world, businesses must keep track of all emerging cybersecurity threats, no matter in which form...
Retrospective into a disruptive year, and an outlook into what's yet to come. Ready to close the book on 2020? Yeah, we all are. But...
Insider threats continue to be on the rise, and are now estimated to comprise 30% of all cyber incidents. While external threats often...
In 2020, we saw digital transformation accelerate along with rising ransomware, threats caused by human error and misconfigurations, and...
Mid-market organizations continue to be challenged by the need for cybersecurity, and the difficulty in finding budget for a full-time IT...
Competitive pressures have never been more significant for chain restaurant operators.
This...
With Netsurion’s BranchSDO CXD all-in-one platform, we found an ideal fit by combining routing, firewall, cellular failover, and Wi...
This holiday season will be like no other with the continued use of remote work, greater online sales, third-party sourcing from...
Businesses are always looking for ways to deliver increased value to clients while optimizing efficiency, and this year is no exception...
For far too long, cybersecurity professionals have had to cobble together multiple tech tools and staff augmentation to round out their...
The crisis produced by the COVID-19 pandemic has dramatically changed consumer behavior and accelerated the digital transformation of the...
The shutdowns that have occurred over the last six months have drastically changed how people are ordering and picking up their food. The...
The threat landscape continues to accelerate, with sophisticated attacks becoming more commonplace as ransomware-as-a-service accelerates...
The MITRE ATT&CK™ framework is an ever-expanding knowledge base of known adversarial tactics and techniques that enables cyber defenders...
The rise in ransomware attack volume and sophistication is a wake-up call for executives and IT departments alike. Traditional perimeter...
The cybersecurity industry is notorious for coining terms and acronyms that rise and fall out of favor before they even have a chance to...
Trying to figure out what is really the difference between SASE, SD-WAN, and SD-Branch? Rest assured you are not alone. Before...
The first look at our new endpoint threat prevention capabilities integrated into EventTracker. This strategic partnership deepens...
The social and economic impact of the COVID-19 pandemic is accelerating the pace of the digital transformation of the multi-unit...
More than 75% of SMBs would change MSPs if they felt they would receive better protection. Netsurion wants to help you understand the...
Restaurant businesses thrive off of innovation, speed, and efficiency. But with thin profits getting thinner, some national chains are...
Threat actors are increasingly gathering across the dark web to coordinate, plan, and launch attacks, some of which can be exposed via...
A retailer with over 400 employees, over twelve distribution warehouses, and an extensive supply chain network to protect.
As an MSP, your focus should be on developing trust, strategy, and a reliable partnership. MSP margins are becoming slimmer and customers...
Netsurion provides 24/7 coverage and reduces false positives. Our small IT and security staff are too busy to chase after log data...
With online ordering and curbside pick-up buoying restaurants, what are the operational and technical considerations needed to...
Netsurion's secure edge networking for retail and hospitality dramatically reduces cost and increases network reliability...
Amid the COVID-19 crisis, restaurants have been forced to quickly adapt to a takeout- and delivery-only model, leaving brands scrambling...
One tenth of 1 percent. It might not seem like much, but it adds up. And when that one tenth of one percent is POS downtime, it adds up...
Business uncertainty has led to widespread adoption of working from home. Since most meaningful tasks in any organization require...
Ransomware is quietly persisting while other stories make headlines, and is now increasingly targeting small and medium sized business...
The Netsurion EventTracker SOC became an extension of the BIS team, providing additional resources that they didn’t have previously.
The public and global businesses alike view ransomware as one of the top cyber threats today. Adversaries are adapting and morphing their...
Despite current challenges, the restaurant industry is adapting to the new reality of social distancing with creativity while doubling...
Quick-service and fast-casual restaurants are struggling to keep up with digital transformation needs while controlling cost and...
With most employees working from home amid COVID-19 (coronavirus) outbreak, VPN servers have now become paramount to a company's...
More Work-from-Home (WFH) scenarios due to COVID-19 present challenges as employees move from a trusted and secured office network to...
A United Kingdom-based Managed Service Provider (MSP) specializing in managed IT, cloud, telecom, and security monitoring services uses...
Maintaining strong cybersecurity is crucial as organizations make impromptu decisions to send more and more employees to work from home...
The MITRE ATT&CK® framework is an ever-expanding knowledge base of known adversarial tactics and techniques that enables cyber defenders...
RSA Conference 2020 has come and gone. It still maintains its status as the largest security event in the world, although attendance...
A data breach today takes 127 days to detect, according to the Ponemon Institute. Comprehensive visibility and real-time analysis of...
A mid-sized Managed Security Provider (MSP) uses EventTracker SIEM (Security Information and Event Management) and SOC-as-a-Service...
Following many high-profile data breaches, consumers have elevated data privacy to front-page news and included it as criteria for brand...
Cybersecurity is complex enough as it is. But merchants are dealing with misinformation that further compounds the complexity, causing...
Already we can see that customers that have Netsurion installed have had fewer network-related calls than our customers that do not have...
Every managed service provider (MSP) is evaluating managed security services to protect their customers and increase revenue. But how...
BranchSDO is the best-fit secure edge networking platform and service developed by Netsurion for the unique needs of multi-unit...
The holiday season is upon us and Netsurion is here to remind you that cybercrime doesn't take a holiday. View the video for tips to stay...
In 2020, we believe cybersecurity convergence will become the difference maker. It will enable MSPs to deliver effective cyber threat...
Just like locking your front door is crucial to protect your house, monitoring account logins to organizational servers and workstations...
The holidays are a busy time for most business owners as they ramp up to serve consumers excited to find holiday specials, or even as...
The Network: A large Managed Service Provider (MSP) uses EventTracker SIEM + SOC-as-a-Service (SOCaaS) from Netsurion for their end...
We built our security processes around Netsurion’s EventTracker Co-managed security. We want to be proactive versus reactive and...
Trust is everything in the healthcare community. Netsurion’s co-managed SIEM/SOC solution addresses our staff challenges with...
For highly distributed enterprises like retail, restaurant, and stores of all kinds, the branch location is the lifeblood of the business...
How Fast Casual and Quick Service Restaurants innovate while protecting the brand and profitability with a software-defined branch...
There are many more endpoints than fortified servers in the data center, and they are staffed by non-technical users who present softer...
The Network: A well-known Managed Service Provider (MSP) specializing in infrastructure monitoring and management, disaster recovery, and...
If a multi-location business is looking for cellular failover connectivity to ensure business continuity in the event of a blackout or...
Threats and threat actors continue to evolve and morph, creating advanced and even more dangerous tactics to mitigate. October is...
The challenge many face is the lack of qualified analysts for in-house SIEM. This is why Co-Managed SIEM is on the rise…it...
The ELK (Elasticsearch, Logstash, Kibana) stack is a popular open source log analysis and management platform. The collection, processing...
One of the key benefits for most businesses deploying SD-WAN is the reduction in WAN costs by up to 80 percent. Continuity and resilience...
While nation-state threat actors and external hackers often garner the headlines, insider threats are an often-overlooked threat vector...
Retail IT Networks Under Stress: How a software-defined branch network (SD-Branch) helps retailers innovate without business interruption.
The retail industry has come a long way during the last decade. Online ordering, in-store beacon technology, cloud POS, omnichannel...
A true story of how one organization was impacted by a data breach. This executive brief shares the true story of an organization, who we...
A financially motivated ransomware gang hit 23 local governments in Texas in a coordinated attack. Ransomware is a type of malicious...
Black Hat 2019 was a learning experience and success for all. All of the hackers, presenters, vendors, and attendees have gone home, but...
At Black Hat 2019, Eric Doerr, GM of the Microsoft Security Response Center, reminded attendees of the interconnectedness of enterprise...
It has grown more challenging to protect patient privacy and secure sensitive data under HIPAA (Health Insurance Portability and...
Netsurion’s EventTracker Essentials solution is the single most important product we’ve launched in our company’s...
Just how much should you be spending on IT Security? It’s a vexing question to answer for many reasons as each situation has their...
MSPs of all sizes are under constant threat from hackers trying to access end-customer systems. The biggest surprise is that most of...
Cloud adoption and digital transformation is driving SD-WAN to replace the traditional WAN. From this transformation, cloud-based...
Are you experiencing a shrinking IT budget and a shortage of cybersecurity experts? Building and retaining a 24/7 SOC team in-house is...
Windows 7 is dead in January 2020. Fact is, the battle has shifted to the endpoint because there are more of them in the network, they...
Is your organization still using Windows 7? Microsoft support is coming to a close in a few short months. If you think end-of-support for...
Join us as we explore the need for reliable, agile and secure branch offices. IT technology sprawl has resulted in complex, expensive...
Small and medium-size (SMBs) have been the target of cyber attacks for a while now, however most are still not protecting themselves. Why...
The cybersecurity market is certainly not short on over-hyped tools designed to solve a specific threat vector. But what is an IT team to...
Overwhelmed by the hype from security vendors in overdrive? Notice the innovation and trends and feel like jumping on the bandwagon? It...
As MPLS contracts approach expiration, the decision to renew or transition to SD-WAN becomes more urgent. This article addresses some of...
The legal world is centered on offering clients protection—and in the current technology environment, that extends to cybersecurity...
Companies try to prevent attackers from getting into their systems with the shotgun approach. They deploy a patchwork of multiple...
The Network: A decentralized university with 34,000 students, dozens of departments, over 9,000 employees and hundreds of servers with...
The way we do business is changing. As critical business applications migrate to the cloud and rely on Hybrid architectures, networking...
Building a better branch network for retailers is not necessarily rocket science. At least, it doesn’t have to be. The formula for...
Banks have always been a prime target for cybercriminals. With enormous stores of cash and consumer data, and the massive threat of...
As a Managed Service Provider (MSP) offering IT infrastructure and end-user systems, your clients rely on you with their valuable assets,...
View insights on why Managed Service Providers (MSPs) are being targeted by adversaries so you and your end customers don’t fall...
Increasing complexity and frequency of attacks have escalated the need for detection of attacks and incident response. Endpoints are the...
With all the benefits and features that SD-WAN architectures bring to businesses and distributed enterprises, there are also new...
For MSPs serving clients in the healthcare industry, protecting data can be complex. With compliance enforcement like HIPAA , for...
Shrinking opportunity, increased price pressure, difficulty getting meetings with prospects….the list goes on. Join Netsurion and David...
Did you know that Microsoft is a security vendor? No, it’s true. For years, the company was hammered by negative public perception...
Netsurion’s Chief Strategy Officer A.N. Ananth joins Holger Schultze, CEO at Cybersecurity Insiders, outline Security Information and...
Over 7 billion global devices in an always on and continuously connected world create a soft target for today’s attacker. Whether...
The Network: A Managed Service Provider (MSP) installed EventTracker Essentials with EDR to mitigate threats on 900 endpoints at a...
Ever heard of Security Information and Event Management (SIEM)? Watch this brief video to learn more about SIEM and why it is an...
Proper cybersecurity includes controls to prevent, detect, and respond to cyber threats. This multi-layer cybersecurity strategy to...
The Network: A managed service provider (MSP) implemented the EventTracker Co-managed SIEM service for a healthcare non-profit...
The networking market is loaded with ambiguous buzzwords and competing acronyms that make it difficult to clearly distinguish one...
We recently released the findings of the Security Information and Event Management (SIEM) study conducted by Cybersecurity Insights. The...
If you think your organization is too small to be targeted by threat actors, think again. Over 60% of organizations have experienced an...
The Network: Our customer is a private equity real estate investment organization on the U.S. East Coast with more than $1B assets under...
The complexities and costs of IT network management and security in retail stores has reached a breaking point. Today’s retail IT...
The Network: Our customer is a leading digital marketing solutions company that empowers millions to find apartments and houses for rent.
Netsurion combines powerful yet easily-deployed edge devices and cloud orchestration, along with next-gen security, cellular failover and...
Protecting a business’ IT infrastructure and data can be difficult with the abundance of threats out there, the array of new data...
Cybercriminals are not using traditional attack methods to invade your systems, so you can't use traditional cybersecurity defense to...
The Network: An association in a specialty medical field is our customer who is dedicated to the highest standards of clinical care...
The Network: Our client is an established law firm with more than 225 lawyers with a long history of well-planned growth, enduring client...
The Network: Our customer is a well-known law firm with more than 350 lawyers practicing across the globe who counsel multinational...
The year 2018 saw ransomware families such as CryptoLocker and variants like Locky continue to plague organizations as cybersecurity...
The Network: A Managed Service Provider (MSP) installed EventTracker SIEM to mitigate threats within a large hotel chain’s system in the...
The Network: Our customer is a major grocery chain with more than 150 stores in 22 states across the USA with a well-administered IT...
It’s that time of the year again! Family and office holiday parties are gearing up, business projects are racing toward year-end...
Many businesses are flocking to this new technology called “SD-WAN” as the solution to these challenges. However, in their...
The Network: A cloud services provider headquartered in the Washington D.C. metro area served an end customer with EventTracker SIEM who...
A refresh has come for distributed enterprises. In 2018, branch office WAN technology has been increasingly moving towards software...
SIEM (Security Information and Event Management) is foundational along with other technologies. But an integrated combination of platform...
We look at Netsurion as a strategic, long-term partner, offering a great product at an affordable price. Netsurion is easy to do business...
The Network: A law firm with many offices worldwide who supplements their team with EventTracker’s co-managed 24/7 SIEM services...
Every business–no matter its size–is a bullseye for cyber criminals. Data breaches cost an average of $3.6 million globally...
For cyber criminals, everyone’s a target. We must assume that, at some point, every organization’s IT infrastructure will be...
Autoscribe’s rich history of innovation in the electronic payment processing business dates back to 1992, with the release of their...
In simpler times, security technology approaches were clearly defined and primarily based on prevention with things like firewalls...
Many IT leaders are excited about the benefits of SD-WAN such as cost reduction, agility/flexibility, ease of deployment, and the options...
Being “cyber secure” is not for the faint of heart. As part of Cybersecurity Awareness Month, we are counting down some of...
A hot trend in the Managed Service Provider (MSP) space is emerging, transforming from an MSP to a Managed Security Service Provider...
Advances in data analytics and increased connectivity have merged to create a powerful platform for change. Today, people, objects, and...
When it comes to selling security, one of the major challenges faced by managed services providers (MSPs) is changing the mind set of...
Ignorance is not bliss. As discussed in the webcast, Data Privacy Compliance in America is changing rapidly. Staying ignorant of the...
Learn how to simplify the compliance process and be audit-ready at all times, while still focusing on your business.
Breaches continue to be reported at a dizzying pace. In 2018 alone, a diverse range of companies — including Best Buy, Delta...
Just after a new security vulnerability surfaced Wednesday, many tech outlets started comparing it with HeartBleed, the serious security...
Implement a Central Collection System Microsoft has made some considerable changes to event management in Windows Vista. But are these...
There are five different ways you can log on in Windows called “logon types.” The Windows Security Log lists the logon type...
With data breaches and Snowden-like information grabs, I’m getting increased requests for how to track data moving to and from...
DNS is an attractive mechanism for performing malicious activities like network reconnaissance, malware downloads, or communication with...
Do you know what questions to ask when evaluating 4G LTE Failover solutions? Get the critical insights you need to make the right choice...
Now that advanced cybersecurity protections are a must-have in today’s landscape, organizations of all sizes are increasingly...
The Network: A global management consulting firm with locations across the USA and UK.
The Network: A bank holding company in the U.S. Midwest with an extensive IT infrastructure.
The Network: The end customer of a well-known Managed Services Provider (MSP) who uses EventTracker Co-managed SIEM to deliver value to...
The Network: A mid-size financial institution on the U.S. East Coast. Hundreds of devices on the internal network. Redundant network...
Retail IT service providers are being asked over and over to do more for their customers, and the opportunity for recurring revenue is...
The cost of network downtime or failing internet connectivity has never been higher due to incidents resulting in million-dollar losses...
Office 365 (O365) is immensely popular across all industry verticals in the small and medium enterprise space. It is often the killer app...
The Network: The end customer of a well-known Managed Services Provider (MSP) who uses EventTracker Co-managed SIEM to safeguard their...
There’s an old saying: Their bark is worse than their bite. However, this is not the case with the penalties of non-compliance when...
It continues to be challenging being a Chief Information Security Officer (CISO) today – and this year promises no rest. As high...
Our customers are priority #1. They come to us with an expectation and we want to deliver. The challenge is keeping up that level of...
GDPR is the biggest change in 20 years for European data security. All EU-based or multi-national companies must comply, but don’t forget...
The cost of doing nothing can be greater than the cost of protecting your business.
What's the cost of securing your network from a cyber attack? According to Precision Analytics and The CAP Group, many companies are...
To streamline operations, improve service and remain competitive, hotels use computers to handle numerous tasks. While automation...
The technological revolution has introduced a plethora of advanced solutions to help identify and stop intrusions. There is no...
The cybersecurity threat landscape is in constant motion – ever evolving. According to Kaspersky Labs, 323,000 new malware strains...
The FBI estimates that more than 4,000 ransomware attacks have occurred daily since the beginning of 2016. That...
Can you simply buy a “SIEM solution”? Turns out you really cannot, no matter how hard you try nor how passionately the vendor...
Security is an ever-escalating arms race. The good guys have gotten better about monitoring the file system for artifacts of advanced...
The argument is an old one; are you better off with a network-based detector, assuming all hosts will eventually communicate, or should...
More and more businesses are adopting 4G LTE either to set up a backup network connection or to gain internet access when other means...
We spun up a dummy website to conduct an experiment on website cybersecurity. The results were very interesting. In less than 24 hours...
It doesn't rhyme and it's not what Whittier said but it's true. If you don't log it when it happens, the evidence is gone...
As I reflect on this year, a Shakespearean quote plays out in my mind – when King Henry the Fifth is rallying his troops to attack...
The Emotet virus has crippled Allentown, PA and is expected to cost an estimated $1 million dollars to fix the damage and remove the...
Are you compliant with PCI DSS Version 3.2? Restaurants, retailers, hotels, doctors' and lawyers' offices, and many more, all need to...
The Cisco Annual Cybersecurity Report provides insights based on threat intelligence gathered by Cisco's security experts, combined...
The Network: A municipal government serviced by an MSP requested that the EventTracker SIEM sensor be installed on hundreds of monitored...
SD-WAN is transforming enterprise networks with affordable network infrastructure by offering low-cost, reliable network connectivity...
As the threat landscape continues to evolve mere protection, however diligent, is not practical to defend against threats. Adversaries...
In 2005, the Department of Homeland Security commissioned Livermore National Labs to produce a kind of pre-emptive post-mortem report.
Cybersecurity is complex enough as it is. But to compound the issue, merchant businesses in the retail, restaurant, and hospitality space...
It’s no secret that the financial industry is under attack. If we learn by recent examples, we know that technology alone is not enough...
We all hear it over and over again: complying with data protection requirements is expensive. But did you know that the financial...
The word cybersecurity can seem daunting and bring to mind images of costly software and hardware needed to protect your business. But...
Are you compliant with PCI DSS Version 3.2? Restaurants, retailers, hotels, doctors' and lawyers' offices, and many more...
Does this sound familiar? You have no control of your environment and most of your efforts are diverted into understanding what happened,...
The Network: A state government agency that performs financial audits of other government departments.
The Network: A bank serving multiple states on the U.S. East Coast with a headquarters and several dozen branch offices; 500+ servers and...
The cybersecurity market is loaded with ambiguous buzzwords and competing acronyms that make it very difficult to clearly distinguish one...
Imagine dealing with a silent, but mentally grating barrage of security alerts every day. The security analyst’s dilemma?
The Network: A diversified global financial services company based on the U.S. east coast. Their IT team is supplemented by EventTracker...
South River Electric Membership Corporation, (South River EMC ) is a member-owned electric distribution cooperative that delivers...
The Network: A law firm with 14 offices worldwide. Their team is supplemented 24/7 by EventTracker’s co-managed security solution.
The Network: A non-profit Electricity Distribution Cooperative serving more than 100,000 members.
It has been a turbulent year for industry as a whole, and retail has been in the center of the turbulence. Amazon bought Whole Foods...
When we are attacked, we feel a sense of outrage and the natural tendency is to want to somehow punish the attacker. To do this, you must...
The Network: A holding company that provides commercial and consumer banking. Their IT team is supplemented by EventTacker Enterprise...
While you’ve been busy defending against ransomware, the bad guys have been scheming about new ways to steal from you. Let’s...
A lot of data, an overwhelming amount actually, is available from hundreds of sources, but rarely is it observed. Having something and...
Interest continues to build around pass-the-hash and related credential artifact attacks, like those made easy by Mimikatz. The main...
Connectivity is key to doing business these days, yet it is estimated that nearly 80% of connected devices are vulnerable to breach.
The evolution of Security Information and Event Management (SIEM) solutions has made a few key shifts over time. It started as simply...
“You’re in the fight, whether you thought you were or not”, Gen. Mike Hayden, former Director of the CIA and NSA...
The Network: A law firm with 14 offices worldwide. Their team is supplemented by EventTracker SIEM on a 24/7 basis.
The Network: A major nonprofit organization that supplements its team with EventTracker Enterprise, our co-managed security solution.
The Network: A holding company that provides commercial and consumer banking. Their IT team is supplemented by EventTracker Enterprise...
The Network: A nonprofit organization in healthcare research. The EventTracker SIEM service supplements their IT team.
As the holidays swiftly approach, many of us are making lists and plans as part of the crescendo of year-end activity. We don’t...
When Point-to-point encryption (P2PE) was standardized by the PCI Security Standards Council, many thought it would become the be-all end...
The IT security industry’s skill shortage is a well-worn topic. Survey after survey indicates that a lack of skilled personnel is a...
While the threats have changed over the past decade, the way systems and networks are managed have not. We continue with the same...
The old Haunted Hotel with squeaky wood floors, welcomed all guests who dared enter the front doors. Guests arrived from every nation...
A common dysfunction in many companies is the disconnect between the CISO, who views cybersecurity as an everyday priority, versus top...
Computers do what they are told, whether good or bad. One of the best ways to detect intrusions is to recognize when computers are...
The Network: A 150-bed hospital in the Caribbean that provides in and outpatient services. The Expectation: IT resources are to be
The Network: A prominent hotel chain with several thousand locations worldwide. This problem was at a specific location on the U.S
he Network: A leading branded merchandise agency with several locations in the U.S. This problem was at a specific location on
The Network: A chain of vacation resorts with several locations in North America. The front desk is supposed to be the
The Network: A not-for-profit 501(c)(3) community asset providing healthcare related services in many states in the southeast United States.
The Network: A Georgia-based IT outsourcing and technology services company that provides managed IT solutions to various companies and...
The Network: A financial services firm in the Midwest U.S. with a very well run network security team on site. The...
The Network: A healthcare services provider with an on-site security team. The EventTracker SIEM service supplements this team.
The Network: Global fine dining company that operates in over 160 countries. The Expectation: Patch management processes and regular...
The Network: A healthcare services provider on the west coast of the U.S. They use EventTracker Enterprise service.
The Network: A technology provider with an on-site IT team. The EventTracker Enterprise service supplements this team.
A U.S. state network with hundreds of servers and workstations across multiple organizations and distributed agencies statewide. The...
The Network: A U.S. federal government agency that is a long-standing user of EventTracker SIEM from Netsurion.
This post got me thinking about a recent conversation I had with the CISO of a financial company. He commented on how quickly his team...
The Network: A Bank serving multiple states on the US East Coast with an HQ and several dozen branch offices; 500+
The Network: A financial institution with operations in multiple states in the USA. The Expectation: Workstations are extensively used at...
The Network: A well regarded private university with nationally ranked academic programs in the U.S. The Expectation: A layered defense from
The Network: Legal firm with hundreds of attorneys, dozens of offices The Expectation: Brand new laptops are clean, they get infected
The Network: A financial firm headquartered in the U.S. East Coast with several hundred servers and workstations. The Expectation...
The Network: A Bank serving multiple states on the U.S. East Coast with a HQ and several dozen branch offices; 500+
The Network: An energy cooperative with multiple datacenters and hundreds of servers. The Expectation: The network design is thoughtfully...
The Network: A government contractor on the U.S. East Coast with 250+ servers and 100+ workstations. The Expectation: System...
The Network: U.S. East Coast data center of a nationwide retailer. Its up-to-date equipment includes a significant investment in Solid State
The Network: A business school with 3,000 students in New England; 200+ servers and 500+ workstations. Microsoft Windows is the dominant
The Network: A financial firm headquartered in the Midwest U.S. with several hundred servers and workstations. The Expectation: Critical...
The Network: Healthcare organization, dozens of servers, several hundred workstations The Expectation: Lean in house IT staff...
The Network: An Electric Cooperative in the US Midwest with 50+ servers and 100+ workstations The Expectation: All servers have sufficient
The Network: A technology provider with an on-site IT team. The EventTracker SIEM service supplements this team.
The Network: A mid-sized state university with multiple locations and 30,000 students. The Expectation: The university library subscribes...
The Network: A law firm headquartered in the U.S. East Coast with a dozen offices worldwide. The Expectation: Email is the
The Network: A financial firm headquartered in the Midwest U.S. with several hundred servers and workstations. The Expectation...
The Network: Central Bank of a nation that sets fiscal policy. There are hundreds of servers and thousands of workstations. They
The Network: A non-profit corporation that operates dozens of hospitals and ancillary care facilities in 17 states. The Expectation...
The Network: A high technology provider on the US East Coast with several hundred servers, including internal webservers and a popular
The Network: HQ location of nationwide retail chain The Expectation: Higher up’s set an example for the rest of us The
The Network: Multi location retail store chain The Expectation: Customers can be provided guest WiFi; it encourages longer stays in-store...
The Network: A financial services firm headquartered on the U.S. East Coast with several hundred servers and workstations. The...
The Network: High tech provider of services The Expectation: Users with IT admin skills are more careful than the average user
The Network: Multi state Electricity provider The Expectation: When IT makes changes, they are done right The Catch: Remote Desktop Protocol
The Network: Financial institution The Expectation: Providing access to email via personal or company provided smartphones boosts...
The Network: A manufacturing facility in the US East Coast with 50+ servers and 100+ workstations The Expectation: User logins fire
The Network: Midwest US banking institution, hundreds of servers and thousands of workstations The Expectation: All USB storage devices...
The Network: A multi-state retailer with 100+ stores on the US East Coast; 400+ servers. The Expectation: Business functions require that
The Network: A well known college system with 35+ locations and 30,000 students. The Expectation: Remote access to data center resources
The Network: A nationwide health insurance provider The Expectation: The health insurance provider uses an antivirus that provides...
Imagine the lost revenue for a major retailer if they needed to shut down all of their stores for a few days, or even a few hours...
Equifax, one of the big-three US credit bureaus, disclosed a major data breach. It affects 143 million individuals — mostly...
By now it’s accepted that SIEM is a foundational technology for both securing a network from threats as well as demonstrating...
2017 has been a banner year for IT Security. The massive publicity of attacks like WannaCry have focused public attention like never...
Why has ransomware exploded on to the scene in 2017? Because it works.
How much security is enough? That’s a hard question to answer. You could spend $1 or $1M on security and still ask the same...
Security experts believe that cybercriminals will be shifting tactics due to declining revenues from stolen credit card sales. We discuss...
What can be done to truly protect a business? Go beyond bare-bones security regulatory compliance by implementing security measures to...
The Talbots Inc. is a leading multi-channel retailer and direct marketer of women’s apparel, shoes and accessories based in Tampa...
A large labor organization was seeking a log management offering that would help it meet government data-security requirements, as well...
A long-standing community bank that provides consumer and commercial financial services was in need of a log management offering that...
While IT security teams identify, hunt, and remove specific variants of the ransomware, there may already be unknown mutated varieties...
An ounce of prevention is worth a pound of cure. Except in business, where an ounce of prevention can be worth several million dollars...
Ransomware attack frequency is at its height as there have been more than 4,000 ransomware attacks happening each day for over a year now...
As I write this, yet another ransomware attack is underway. This time it’s called Petya, and it again uses SMB to spread. But here...
We're counting down the top hotel POS data breaches of all-time...and the lessons we have learned from them.
A new ransomware variant is sweeping across the globe known as Petya. It is currently having an impact on a wide range of industries and...
While automation facilitates hotel operations and often makes a better stay for guests, it also opens hotels to digital threats...
With stolen credit card data value on the decline in the black market, and the continued rise of ransomware attacks, retailers are...
With distressing regularity, new breaches continue to make headlines. The biggest companies, the largest institutions both private and...
Is it over? Will it happen again? - How it spreads - What it does - Technical details - What Netsurion, through our SIEM-at-the-Edge...
No industry is immune to these attacks, which if successful are a blot on financial statements of the targeted companies. Despite their...
As the summer travel season quickly approaches, most people envision exchanging work clothes and school books for shorts, flip flops, and...
As the second iteration of the WannaCry ransomware impacting IT infrastructure around the globe is expected, we want to arm our customers...
Shared threat intelligence is an attractive concept. The good guys share experiences about what the bad guys are doing thereby blunting...
As a new business owner, there is so much to be proud of and so much to do. Your idea turned into a plan that has been put to action, so...
I’m a big believer in security analytics and detective controls in general. At least sometimes, bad guys are going to evade...
Tax season is a busy time of year for hackers, given the ample opportunities to steal personal and financial information through phishing...
IT workers in general, but more so IT Security professionals, pride themselves on their technical skills. Keeping abreast of the latest...
How Strong Are Your Passwords? Netsurion tips to keep you and your business protected.
Learn why firewalls, anti-virus, and anti-malware alone may not be enough to secure your business from the ever-evolving threat landscape...
So you got hit by a data breach, an all too common occurrence in today’s security environment. Who gets hit? Odds are you will say...
The insider threat is typically much more infrequent than external attacks, but they usually pose a much higher severity of risk for...
Restaurants with multiple locations are taxed with increased pressure to succeed in different geographic locations, with potentially...
Ransomware is about denying you access to your data via encryption. But that denial has to be of a great enough magnitude create...
Securing medical records is a complex undertaking. Healthcare organizations need an array of security technologies that can be used to...
A good security plan can be overwhelming at first, but with the right knowledge and expertise, it can be simplified and managed. On this...
Defense strategies that focus exclusively on the perimeter and on prevention do not take into account the kill chain life cycle approach;...
We believe that every business should have the means to protect themselves and their customers from cyberattacks, and the PCI Security...
‘Twas the night before Christmas and all through HQ Not a creature was stirring, except greedy Lou – An insider thief who had...
Regulatory compliance is a necessary step for IT leaders, but it’s not sufficient enough to reduce residual IT security...
Though there are many companies out there responsible for securing merchant locations from the risks of data breaches, people’s own...
Sure, the headlines have been wrought with healthcare ransomware stories, election-centric email breaches, and massive retail hacks&mdash...
Log collection, SIEM and security monitoring are the journey not the destination. Unfortunately, the destination is often a false...
Are you feverishly working to patch your systems today with the latest available patches? Or are you spending your time unfriending...
We have been implementing Security Information and Event Management (SIEM) solutions for more than 10 years. We serve hundreds of active...
We are delighted that EventTracker is now part of the Netsurion family. On October 13, 2016 we announced our merger with managed security...
Years ago, in a data security nightmare not so far away…I found out how quickly a brand could change from being a favorite of mine...
How do you figure out when someone was actually logged onto their PC? The data is there in the security log, but it’s so much...
The presidential debate, as entertaining as it was for many, was a great place to hear about the focus needed on cybersecurity issues in...
Persistent threats affecting businesses of all sizes and in all verticals are becoming more consistent and hitting more frequently. The...
News about a company being breached seems to be a regular occurrence nowadays. And it’s no...
PCI compliance: that daunting phrase you always hear in the world of payments…but never truly...
A common hacking method is to steal information by first gaining lower-level access to your network. This can happen in a variety of ways...
Cyber criminals are constantly developing increasingly sophisticated and dangerous malware programs. Statistics for the first quarter of...
The event, aimed at connecting the point-of-sale (POS) technology ecosystem, was extremely successful...
Windows gives you several ways to control which computers can be logged onto with a given account. Leveraging these features is a...
When business owners start looking at Point-of-Sale (POS) systems, they may feel overwhelmed at the...
So you have a big brand name that millions of consumers trust. You have hundreds to thousands of...
We know how tempting those summer sales are! But are you being careful on where you are swiping your card?
Ideas to Retire is a TechTank series of blog posts that identify outdated practices in public sector IT management and suggest new ideas...
There’s a wealth of intelligence available in your DNS logs that can help you detect persistent threats. So how can you use them to...
In this fifth article of the series, we continue to explore the basic ways businesses can keep their networks safer. These include tools...
Analytics is an essential component of a modern SIEM solution. The ability to crunch large volumes of log and security data in order to...
We have gathered what have been common comments that we hear from business owners. And today, we would like to bust these myths!
Detecting virus signatures is so last year. Creating a virus with a unique signature or hash is quite literally child’s play, and...
In this fourth article in the series, we continue to explore some of the basic ways that business of all sizes can keep their computer...
In a recent webinar, we demonstrated techniques by which EventTracker monitors DNS logs to uncover attempts by malware to communicate...
In this entry we discuss the topic of anti-virus protection. There are many questions that come up when we talk about this topic. So here...
While software that can be installed on your PC and used to remotely connect when you are away from your home office can be very handy...
Far too many SIEM implementations are considered to be catastrophes. Having implemented hundreds of such projects, here are the three...
If you are not keeping up with regular patching of your computer and the programs that run on it – then you are simply asking for...
Ransomware burst onto the scene with high profile attacks against hospitals, law firms and other organizations. What is it and how...
2016 Verizon Breach Investigations Report (Part 3 of 3) We've covered the 4 patterns of attack used by hackers, expanded on...
2016 Verizon Breach Investigations Report (Part 2 of 3) In our previous post we showed you that regardless of the business&rsquo...
SC Magazine released the results of a research survey focused on the rising acceptance of SIEM-as-a-Service for the small and medium...
2016 Verizon Breach Investigations Report (Part 1 of 3) The 80 page report is packed with valuable data breach insights. We know...
It's National Small Business Week! Let's celebrate the hard work you do and make sure your...
PCI DSS 3.2 is scheduled for release at the end of April. Have you thought about how this update can affect your business? Will you still...
Yet another recent report confirms the obvious, that SMBs in general do not take security seriously enough. The truth is a bit more...
While your business’ data security program should consist of many components, perhaps the most effective defense to ransomware is...
Traditional areas of risk — financial risk, operational risk, geopolitical risk, risk of natural disasters — have been part...
Ransomware is a business’ worst nightmare. This malware infects computers and restricts the users from accessing any of their data...
Do you embrace the matrix? The fact is, once networks get to a certain size, IT organizations begin to specialize and small kingdoms emerge.
Cloud security is getting attention and that’s as it should be. But before you get hung up on techie security details, like...
The range of threats included trojans, worms, trojan downloaders and droppers, exploits and bots (backdoor trojans), among others. When...
I have fond memories of playing a board game called Hungry Hungry Hippos in my younger days. Today’s medical practices mirror the...
While you focus on providing the best health service for your patients, it is easy to under-estimate the risks that you may be putting...
Windows supports the digitally signing of EXEs and other application files so that you can verify the provenance of software before it...
Here’s our list of the Top 5 SIEM complaints:1) We bought a security information and event management (SIEM) system, but it...
Think about the burglar alarm systems that are common in residential neighborhoods. In the eye of the passive observer, an alarm system...
Winning a marathon requires dedication and preparation. Over long periods of time. A sprint requires intense energy but for a short...
It’s understandable that the primary goal of any healthcare practice is to keep their patients healthy and safe. But what about...
Given today’s threat landscape, let’s acknowledge that a breach has either already occurred within our network or that it...
2015 was a tough year for the healthcare industry. Some are even calling 2015 “the year of...
The traditional method for calculating standard Return on Investment (RoI) is that it equals the gain minus the cost, divided by the...
It’s the holiday season and for many that means shopping season! But it also means that theft increases, whether it is physical...
Here we are going to look for Event ID 4740. This is the security event that is logged whenever an account gets locked. “User X...
2015 has been a year of healthcare data breaches. But why are hackers going after healthcare records now?
Many small businesses believe only the "big guys" will suffer a data breach. But did you know that 90% of data breaches impact...
As data breaches occur more and more, it is no secret that the market needs more cybersecurity professionals. Here are a few statistics...
Security Subsistence Syndrome (SSS) is defined as a mindset in an organization that believes it has no security choices and is...
Technology keeps improving, as do hackers. Hackers have been around for years and years; from exploiting the vulnerabilities of telephone...
If attackers can deploy a remote administration tool (RAT) on your network, it makes it so much easier for them. RATs make it luxurious...
Nearly 60% of businesses have experienced a breach in the last two years. Have you ever considered what would happen if your business was...
EventTracker users know that one of its primary functions is to apply built-in knowledge to reduce the flood of all security/log data to...
Merchants know by now that after October 1st the liability for card-present fraud will shift to whichever party is the least EMV...
Passwords keep your accounts and network safe but may also be a gateway for hackers. Here are some quick tips we recommend when creating...
We hear a lot about tracking privileged access today because privileged users like Domain Admins can do a lot of damage. But more...
The number of data breaches continues to increase. Cybercrime affects your brand, your customers and your employees in ways that are...
The CDC estimates that close to 80% of office-based physicians use some form of electronic medical records. This increase, coupled with...
What is the true cost of a data breach? A data breach affects your business, brand, and reputation. But it can be prevented.
Four Common Data Threats
For many years now, the security industry has become somewhat reliant on ‘indicators of compromise’ (IoC) to act as clues...
There’s plenty of interest in all kinds of advanced security technologies like threat intelligence, strong/dynamic authentication...
The gap between the ‘time to compromise’ and the ‘time to discover’ is the detection deficit. According to...
In the wake of BackOff, and numerous other data breaches, consumers are demanding answers into the how and why surrounding companies who...
It’s clear that we are now working under the assumption of a breach. The challenge is to find the attacker before they cause damage. Once...
In today’s business world, a major draw for many customers is the ability to stay connected while outside the office. In order to...
Six ways to shoot yourself with SIEM technology: 1) Dont plan; just jump in 2) Have no defined scope or use cases; whatever 3) Confuse...
A data breach has serious consequences both directly and indirectly. Lost revenue and a tarnished brand reputation both inflict harm...
This fundamental tradeoff between security, usability, and cost is critical. Yes, it is possible to have both security and usability...
It is becoming more and more frequent to read about electronic data breaches in the news these days. Unfortunately, what is not touched...
Is it possible to avoid security breaches? Judging from recent headlines, probably not. Victims range from startups like Kreditech, to...
You may recall that back in 2012, then Secretary of Defense Leon Panetta warned of “a cyber Pearl Harbor; an attack that would cause...
Sometimes we get hung up on event monitoring and forget about the “I” in SIEM which stands for information. Not forgetting...
Whether we are talking about shoppers being students, families, or business execs, having the ability to interact with your guests via...
There is great excitement amongst security technology and service providers about the intersection of global threat intelligence with...
How many days go by between news stories involving computer breaches? The truth of the matter is that as long as sensitive data is...
Bad actors/actions are more and more prevalent on the Internet. Who are they? What are they up to? Are they prowling in your network...
Log monitoring is difficult for many reasons. For one thing there are not many events that unquestionably indicate an intrusion or...
Traditional threat models posit that it is necessary to protect against all attacks. While this may be true for a critical national...
We live in a brave new world where the spies of yesteryear, like James Bond and Jason Bourne, are truly falling away into the realm of...
You must have a heard light bulb jokes, for example: How many optimists does it take to screw in a light bulb? None, they’re...
The Georgia based fast food company, Chick-fil-A, has confirmed that it is investigating a potential credit card breach. The...
In computer terminology, a honeypot is a computer system set to detect, deflect, or, in some manner, counteract attempts at...
So when you are a hacker and you write the most successful financial transaction hacking software in history, what do you do next? Well...
Security Information and Event Management (SIEM) technology is an essential component in a modern defense-in-depth strategy for IT...
In the wake of Heartbleed, comes a new form of exposure that could potentially do much more damage than any other vulnerability of its...
If you manage any Linux machines, it is essential that you know where the log files are located, and what is contained in them. From a...
Most merchants who have been validating their PCI compliance for a few years now probably know which SAQ type applies to them. In PCI 2.0...
Every now and then hackers develop a piece of malware that is so insidious that it changes the landscape of computer security and...
I often get asked how to audit the deletion of objects in Active Directory. It’s pretty easy to do this with the Windows Security...
Return on investment (ROI) - it is the Achilles heel of IT management. Nobody minds spending money to avoid costs, prevent disasters, and...
Are you familiar with the Kübler-Ross 5 Stages of Grief model? SIEM implementation (and indeed most enterprise software installations...
Security Information and Event Management (SIEM) is a term coined by Gartner in 2005 to describe technology used to monitor and help...
Analyzing all the login and pre-authentication failures within your organization can be tedious. There are thousands of login failures...
Many of our customers and resellers have asked how Heartbleed affected Netsurion services. In a nutshell, the managed services that make...
In the wake of their breach, Target announced on March 5, 2014 that their CIO, Beth Jacob was announcing her resignation. This begs the...
Unstructured data access governance is a big compliance concern. Unstructured data is difficult to secure because there’s so...
For the past several months, there have been numerous stories about major retailers that have been breached by hackers. The result is...
The PCI Security Standards Council is an open global forum, launched in 2006, that is responsible for the development, management...
It was the fall of 2008. A variant of a three year old relatively benign worm began infecting U.S. military networks via thumb drives.
When Target announced that it had suffered a major breach of approximately 40 million credit cards and 70 million customer records, the...
Why should you, as a merchant, comply with the PCI Security Standards? At first glance, especially if you are a smaller organization, it...
When people think of Christmas, most of them imagine family gatherings and good times. We often forget that from the end of Thanksgiving...
Over the years, security admins have repeatedly asked me how to audit file shares in Windows. Until Windows Server 2008, there were...
The department store giant garnered unwanted attention earlier this month when they announced that a Florida store fell victim to a team...
Every 3 years the Payment Card Industry Data Security Standard (PCI) is updated to a new version. The time for the next release is right...
From a PCI compliance standpoint, merchants using Windows XP will have problems maintaining compliance...
There is a new trend facing people who rely on help desks. Hackers are targeting help desks because they know that the people who provide...
What security events get logged when a user logs on to their workstation with a domain account and proceeds to run local applications and...
In the aftermath of the disclosure of the NSA program called PRISM by Edward Snowden to a reporter at The Guardian...
In the wake of the most recent terrorist bombing in Boston, it is easy to understand why some people...
Square strives to make financial transactions simple enough so that the average person on the street...
One thing I always wished you could do in Windows auditing was mandate that access to an object be audited if the user was NOT a member...
This type of issue with a browser is so damaging because computer hackers who take advantage of it...
When you think about electronic security, what comes to mind? Do you consider how vulnerable your...
I think one of the most underutilized features of Windows Auditing and the Security Log are Process Tracking events. In Windows 2003/XP...
In the dark ages of personal computers (1980′s and 90′s), you either needed to be a...
In what should only be considered a victory for the U.S. DOJ, 2 of the 4 alleged Subway hackers responsible for potentially $10 Million...
I often encounter a dangerous misconception about the Windows Security Log: the idea that you only need to monitor domain controller...
The past year has been a hair-raising series of IT security breakdowns and headlining events reaching as high as RSA itself falling...
When we originally conceived the idea of SIEM and log management solution for IT managers many years ago, it was because of the...
There’s been a lot of recent hype about security risks with the rise of virtualization, but much of it is vague and short on...
Intrusion detection and compliance are the focus of log management, SIEM and security logging. But security logs, when managed...
HIPAA Logging HOWTO, Part 2 The Health Insurance Portability and Accountability Act of 1996 (HIPAA) outlines relevant security and...
I am often asked that if Log Management is so important to the modern IT department, then how come more than 80% of the market that...
Despite the fact that security industry has been fighting malicious software – viruses, worms, spyware, bots and other malware...
There is a lot of discussion around Security MSSPs, SaaS (Security as a Service) and Cloud Computing these days. I always felt I had a...
Unfortunately, IT is not perfect; nothing in our world can be. Compounding the inevitable failures and weaknesses in any system designed...
No one needs to be convinced that monitoring Domain Controller security logs is important; member servers are equally as important: most...
An area of audit logging that is often confusing is the difference between two categories in the Windows security log: Account Logon...
Randy Franklin Smith compares methods for detecting malicious activity from logs including monitoring for high impact changes, setting up...
In most previous newsletters, we have discussed the use of logging for various regulatory mandates (such as PCI DSS, HIPAA and FISMA) as...
Preparing the Infrastructure From all the uses for log data across the spectrum of security, compliance, and operations, using logs for...
Time won't give me time: The importance of time synchronization for Log Management
Often when I engage with a prospect their first question is “How many events per second (EPS) can EventTracker handle?&rdquo...
The 5 W’s of security management I’ve seen it happen about a thousand times if I’ve seen it once. A high profile...
The number 1 vulnerability on the OWASP list is cross site scripting or XSS. XSS seems to have replaced SQL injection as the new favorite...
With so much focus on security these days, it’s easy to imagine that IT departments are winning the battle against malware and...
While there is little doubt that SIEM solutions are critical for compliance, security monitoring or IT optimization, it is getting harder...
When outsourcing isn’t an option but SIEM proficiency is beyond the internal staff ’s expertise, a hybrid approach is...
The purpose of this white paper is to identify and demonstrate how to detect five of the most significant security threats. Critical...
Despite the obvious benefits of Log Management and its increasing recognition as a critical necessity by the IT organization, Log...
This paper highlights the major advantages of employing EventTracker to consolidate, correlate, and manage event log data by discussing...
The benefits of employing virtualization in the corporate data center are compelling - lower operatingcosts, better resource utilization,...
Netsurion offers solutions for Network Operations and Security Operations. Individually, they deliver powerful results. Together, they...
This White Paper discusses how you can take advantage of the power of high capacity USB storage devices like thumb/flash drives without...
The Department of Defense (DoD) is rolling out the CMMC for DoD contractors this year. This means that before bidding on DoD contracts...
Monitoring event logs from workstations provides two important benefits. Firstly, it saves money by adopting a proactive approach to...
With cyberattacks targeting small- to medium- size businesses (SMBs), MSPs are finding themselves at the crossroads.
Netsurion is a proud early member of the Restaurant Technology Network (RTN). The RTN is a membership community dedicated to the...
This technical whitepaper describes the ten most critical security conditions that are not monitored by the Windows Operating System or...
An introduction to collecting important Windows workstation event logs and storing them in a central location for easier searching and...
With companies making painful personnel and compensation choices in this poor economy, one of the impacts has been an explosion in the...
Thanks to partners like you, our program has been growing fast each year! This good news brings opportunities to enhance our program for...
Customers look to Managed Security Service Providers (MSSPs) as trusted advisors in achieving digital transformation and navigating ever...