Blog

People demonstrating a figurative illustration of what network segmentation is.

What is network segmentation?

Putting all your organization’s devices onto one public network and allowing VPN access to cloud-based resources without internal security is an ideal situation for hackers looking to steal data. But when internet connecting devices are everywhere from your phones to … Read More

Man surrounded by computers with screens showing the impacts of ransomware.

How to Prevent Ransomware from Affecting Businesses

A recent ransomware attack on Baltimore has affected city infrastructure such as hospitals, airports, and ATMs according to the Baltimore Sun. Yet the effects of ransomware are not limited to city infrastructure. Ransomware can affect everything from personal computers to … Read More

Man in hoodie with the words VPN Hack behind him. Showing the VPN vulnerability that shows the need for Zero Trust Network Access.

VPN Vulnerability Shows Need for Software Defined Perimeter

The Department of Homeland Security issued a warning last month about VPN packages from F5, Palo Alto, Pulse, and Cisco. According to Network World, these packages might fail to properly secure tokens and cookies. This could enable cyber criminals to … Read More

Couple shopping for the latest tech, theoretically including Network Access Control (NAC).

The State of Network Access Control

When it comes to controlling access to your network, there are three data points that are more important than any others. Knowing who accesses, what accesses and where your network is accessed from is critical to its continued security. A … Read More

Someone offers a tablet that reads "data security" with a pen to symbolize the need for Zero Trust to provide data security.

What is the Zero Trust Model

Zero Trust is a model for IT security in which access is only granted if the connecting devices and users are confirmed to be both authorized and authenticated. This is true regardless of the location of devices or their users. … Read More

Employee wrapped in caution tape representing an internal threat. Demonstrating the need for the Zero Trust model to protect against internal threats.

Insider Threats and the Zero Trust Model

In a world where the threat of attack from trusted insiders and penetrating outsiders within your network has increasing impact, you need to secure not only the borders of your organization’s network to defend against outside threats but the inside … Read More

Hacker reaches hand through computer to simulate a phishing attack.

Prevent Phishing Attacks, Keep Your Organization Safe

Prospective college students know the anxiety of waiting for college acceptance letters well. Unfortunately, the hackers behind one of the latest phishing attacks knew this too. According to the Chronicle of Higher Education, hackers sent prospective students at three colleges … Read More

A man working at a laptop displaying a login screen with a shadowy figure in the background.

How Cybersecurity Varies Between Industries

Cybersecurity is a critical issue for modern industries, but some industries have different needs than others. This is due to factors that vary between industries like motivation, attack vectors, regulations and organizational structure. Learning about these differences may help organizations … Read More

Banks of All Sizes Should Prepare for Cyber Attacks

While cyber attacks on large international banks attract most media attention, small banks are also at risk. A study from the Ponemon Institute and Accenture found the average number of breaches per financial services company was 125 in 2017. In … Read More