Blog

By Nancy Rand, Posted in Security

The PCI Council has published a series of blogs on payment data security as part of their task force for small merchants.  Topics include: Back-to-Basics: Think Before You Click Back-to-Basics: Properly Configured Firewalls Back-to-Basics: Secure Remote Access Back-to-Basics: Use Strong Encryption Back-to-Basics: Keep Software Patched Back-to-Basics: Use Strong Passwords Back-to-Basics: Reduce Where Payment Data Can Be Found PCI SSC Shares Resources for Navigating Changing Payment Environmen... read more.

  • September 08, 2021

By Nancy Rand, Posted in Infrastructure, Security

On August 5, 2021, the PCI DSS Council and the Cloud Security Alliance (CSA) issued a joint statement on the importance of cloud scoping. https://www.pcisecuritystandards.org/about_us/press_releases/pr_08052021 https://www.pcisecuritystandards.org/pdfs/PCI_Cloud_Security_Alliance_Cloud_Bulletin.pdf Best practices focus areas are discussed: Data protection, Authentication, Systems management, DevOps & DevSecOps, Data governance and Resiliency. These best practices are important to the security of clou... read more.

  • September 02, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/23 Check Point Research: Education sector sees 29% increase in attacks against organizations globally Check Point Research (CPR) today reports that since mid-2020, we are seeing a steady increase in the weekly number of cyberattacks per organization globally, with the education/research sector being impacted at a higher rate than others. https://bit.ly/3jabv80 The Need for Endpoint Security Isn't Going Away (Fortinet) The combination of the work from anywhere workforce and the growing sophisti... read more.

  • August 27, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/16 Breaking Down STEM Perception Barriers and Tackling a Career in Cybersecurity (Fortinet) Fortinet profiles two women in cybersecurity, cybersecurity career interns Taylor Leslie and Claire Smerdon, who speak about what interested them about a STEM career in cybersecurity, what obstacles they have faced, and what they think we can do to help break down perception barriers. https://bit.ly/3xM72w5 What to Do After Responding to a Phishing Email (Proofpoint) Phishing emails can target anyone wi... read more.

  • August 23, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/9 Extortion Payments Hit New Records as Ransomware Crisis Intensifies (Palo Alto Networks) The ransomware crisis continues to intensify as criminal enterprises boost investment in highly profitable ransomware operations. https://bit.ly/3lMmQNe CISA Launches New Joint Cyber Defense Collaborative CISA is establishing the JCDC to integrate unique cyber capabilities across multiple federal agencies, many state and local governments, and countless private sector entities to achieve shared objective... read more.

  • August 13, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/19 Respond to Business Challenges with Agile Storage (Pure Storage) Unexpected events are inevitable. With agile data storage, you can stay modern while responding to your business needs in an economical way. https://bit.ly/3itfB9o Check Point Software showcases new offerings, integrations, and tools at Microsoft Inspire 2021 The decades-long partnership between Microsoft and Check Point Software Technologies is not only a strong building block for our companies, it’s also a great tool f... read more.

  • August 06, 2021

By Ed Bratter, Posted in Infrastructure, Security

One of the benefits of Microsoft 365 is the ability for users to collaborate and share with co-workers, clients, vendors, partners, and people external to the organization. This benefit, however, comes with a downside; users can either purposely or inadvertently expose information that the organization would not want shared externally.   To complicate matters, newly established tenants leave the door wide-open for publishing data to external entities. As a result, users can share data with outside ind... read more.

  • July 27, 2021

By Ken Phelan, Posted in Uncategorized

As many of us return to work and the world feels like it’s returning to normal, it can be easy to forget that the COVID-19 pandemic isn’t completely behind us. Cases are surging in parts of the country, and for a growing number of people, their initial case of COVID was just the beginning of an ongoing ordeal known as long COVID, post-COVID, or long-haul COVID. This terrible affliction has stricken one of the Gotham family and we are rallying around Jason. Jason is Fara Smith’s twin broth... read more.

  • July 26, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/12 What’s new with Citrix Workspace — June 2021 We continue to make the employee experience better and more productive for workers and the IT management process more automated, seamless and intuitive for the  IT teams that manage digital infrastructure. With each month that goes by, we find new ways to bring innovations to market to reach those goals. https://bit.ly/3r30lnL QLC: Yes, It’s Real and People Want It (Pure Storage) Not only are we eliminating the need for hyb... read more.

  • July 16, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/28 Make Internet Access Safe - Adopt Zero Trust Network Security! (Palo Alto Networks) As applications move to the cloud and users work from anywhere, securing internet access has moved to the forefront in the battle against cybercriminals. https://bit.ly/3qx9Ifl 5 White House Recommendations for Modern Data Protection Against Ransomware (Pure Storage) In response to these increasing cyber threats, the White House recently raised ransomware to the top of the national security agenda, issuing a... read more.

  • July 09, 2021