Shoppers Care If You've Been Breached!

December 07, 2015
It’s the holiday season and for many that means shopping season! But it also means that theft increases, whether it is physical theft or cyber theft.

Diagnosing Account Lockout in Active Directory

December 02, 2015
Here we are going to look for Event ID 4740. This is the security event that is logged whenever an account gets locked. “User X” is getting locked out and Security Event ID 4740 are logged on respective servers with detailed information.

Why Do Hackers Want Your Medical Records

November 16, 2015
2015 has been a year of healthcare data breaches. But why are hackers going after healthcare records now?

6 Safe Computing Tips to Help Retailers Fight Off Hackers

November 02, 2015
Many small businesses believe only the "big guys" will suffer a data breach. But did you know that 90% of data breaches impact small merchants?

Cybersecurity Professionals

October 26, 2015
As data breaches occur more and more, it is no secret that the market needs more cybersecurity professionals. Here are a few statistics on the need to educate the next generation on pursuing cyber professional careers.

The Evolution of the Hacker

October 19, 2015
Technology keeps improving, as do hackers. Hackers have been around for years and years; from exploiting the vulnerabilities of telephone lines to penetrating big retail stores' networks. As hackers get smarter, so do we.

The Ten Steps Post Data Breach

October 12, 2015
Nearly 60% of businesses have experienced a breach in the last two years. Have you ever considered what would happen if your business was breached? Do you have a plan of action?

Six Simple Rules For Safe Credit Card Handling

October 05, 2015
The more you create a culture of security in your business, the safer your business will be. Make sure you have resources that your employees can use to educate themselves on dealing with security threats.

The Transition to EMV Isn't Over

September 28, 2015
Merchants know by now that after October 1st the liability for card-present fraud will shift to whichever party is the least EMV-compliant in a fraudulent transaction. This means that merchants will be more accountable if EMV is not implemented.

How Strong Are Your Passwords? Tips To Keep You Protected

September 21, 2015
Passwords keep your accounts and network safe but may also be a gateway for hackers. Here are some quick tips we recommend when creating your passwords.

Find Out Who Is Affected By A Data Breach?

September 14, 2015
The number of data breaches continues to increase. Cybercrime affects your brand, your customers and your employees in ways that are unrecoverable at times. Don't let your business be affected next.

Healthcare Practices are at Particularly High Risk of Data Breach

September 10, 2015
The CDC estimates that close to 80% of office-based physicians use some form of electronic medical records. This increase, coupled with recent breaches of patients’ PHI and PII, has highlighted the need for security of medical office networks.

The Impact Of A Data Breach

August 31, 2015
What is the true cost of a data breach? A data breach affects your business, brand, and reputation. But it can be prevented.

4 Common Data Threats Every Business Needs to Be Aware Of

August 24, 2015
Four Common Data Threats

Three Indicators of Attack

August 19, 2015

For many years now, the security industry has become somewhat reliant on ‘indicators of compromise’ (IoC) to act as clues that an organization has been breached. Every year, companies invest heavily in digital forensic tools to identify the perpetrators and which parts of the network were compromised in the aftermath of an attack.

Netsurion Defense Against Backoff

July 14, 2015
In the wake of BackOff, and numerous other data breaches, consumers are demanding answers into the how and why surrounding companies who have inadvertently allowed data to be compromised given security measures accessible today.

Wireless Security for Business

June 08, 2015
In today’s business world, a major draw for many customers is the ability to stay connected while outside the office. In order to provide this connectivity, typically means having a wireless network set up for your customers. However, it also means placing your business at a potential risk.

How to shoot yourself in the foot with SIEM

June 03, 2015
Six ways to shoot yourself with SIEM technology: 1) Dont plan; just jump in 2) Have no defined scope or use cases; whatever 3) Confuse SIEM with Log Management 4) Monitor noise; apply no filters 5) Don’t correlate with any other technologies eg IDS, Vulnerability scanner, Active Directory 6) Staff poorly or not at all

Six Simple Rules For Safe Credit Card Handling

May 05, 2015
It is becoming more and more frequent to read about electronic data breaches in the news these days. Unfortunately, what is not touched on as frequently are the physical security issues present in restaurant and retail establishments.

Make Your Wireless Work For You

March 12, 2015
Whether we are talking about shoppers being students, families, or business execs, having the ability to interact with your guests via wireless and mobile is becoming the standard. Why miss the opportunity to further engage with customers while they are still in your store?

The Pyramid of Pain

February 25, 2015

There is great excitement amongst security technology and service providers about the intersection of global threat intelligence with local observations in the network. While there is certainly cause for excitement, it’s worth pausing to ask the question “Is Threat Intelligence being used effectively?"

Every Merchant Needs Electronic Data Protection

February 19, 2015
How many days go by between news stories involving computer breaches? The truth of the matter is that as long as sensitive data is gathered by merchants, thieves will attempt to steal it.

Why Naming Conventions are Important to Log Monitoring

January 22, 2015
Log monitoring is difficult for many reasons. For one thing there are not many events that unquestionably indicate an intrusion or malicious activity. If it were that easy the system would just prevent the attack in the first place.

Why Risk Classification is Important

January 21, 2015

Traditional threat models posit that it is necessary to protect against all attacks. While this may be true for a critical national defense network, it is unlikely to be true for the typical commercial enterprise. In fact many technically possible attacks are economically infeasible and thus not attempted by typical attackers.

State Sponsored Hacking – More Than an Issue for Sony

January 14, 2015
We live in a brave new world where the spies of yesteryear, like James Bond and Jason Bourne, are truly falling away into the realm of fantasy, replaced instead with hackers, doing battle on the digital front.

Five Steps to Protect Retailers from Credit Card Theft

January 07, 2015
The Georgia based fast food company, Chick-fil-A, has confirmed that it is investigating a potential credit card breach. The investigation is focused on the company’s point-of-sale (POS) network at some of its restaurants and the breach is thought to have occurred between December of 2013 and September of 2014.