Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/29 A Tale of Two Ransomware Attacks: Which Company Are You? (Pure Storage) Ransomware attacks became a matter of not “if” but “when,” with experts predicting a ransomware attack every 11 seconds in 2021. Sophisticated cybercriminals continue to prey on vulnerabilities, and victims are giving in to demands and handing over cash to retrieve their encrypted data. https://bit.ly/39oEwYc FBI Internet Crime Report Shows that Email Fraud Represents the Largest Financial Losses... read more.

  • April 02, 2021

By Timothy Karl, Posted in Infrastructure, Support

Today, over 85% of organizations worldwide operate on Microsoft Active Directory. In many cases, Active Directory has been in place for decades and has not been well maintained for security posture. Hackers often target Active Directory as an easy way for gaining access to a customer’s environment. Gotham has developed an Active Directory Security Risk Assessment offering to provide specific actionable guidance to mitigate security risks in your Active Directory environment. The assessment focuses on... read more.

  • March 31, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/22 Gotham has earned a spot on CRN’s 2021 Tech Elite 250 list, recognizing us as one of the top IT solution providers in North America. We are proud to continue to provide the best service for our customers. http://bit.ly/3c9xhVJ Attacker Economics and the Lure of Credential Stuffing (F5) F5 Labs and Shape Security research recently reported that credential spill incidents nearly doubled from 2016 to 2020. http://bit.ly/315H6Oe Okta and Proofpoint: Uniting People-centric Security and Id... read more.

  • March 26, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/15 Fighting Credential Phishing by Isolating and Protecting Your At-Risk Users (Proofpoint) Protection must start with people, protecting them from advanced threat tactics and arming them with knowledge and tools to help protect the organization. http://bit.ly/3bP0Yvb Who Let the SolarWinds Out? The ingenuity of the bad actors was on full display as they successfully infiltrated, compromised, and manipulated the SolarWinds software update service. With that manipulation in place, the bad actor... read more.

  • March 19, 2021

By Ryan Lee, Posted in

As more and more organizations and employees shift to a work-from-home model, secure external access via Citrix Application Delivery Controllers (ADCs) continue to become even more crucial. As a market leader in the application delivery space, Citrix continues to develop, enhance, secure, and optimize its Citrix ADC hardware and software platforms. In order to take advantage of some of the latest and greatest enhancements, as well as maintain support agreements, firmware upgrades are necessary. For the mos... read more.

  • March 12, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/1 NSA Releases Guidance on Zero Trust Security Model CISA encourages administrators and organizations review NSA’s guidance on Embracing a Zero Trust Security Model to help secure sensitive data, systems, and services. http://bit.ly/3sxsOS0 Cloud Kickoff Guide: Starting your cloud journey on the right foot (Citrix) We saw an opportunity to condense the basic, foundational information all our Citrix Cloud customers need into a single resource — almost like a pre-planning guide &mdas... read more.

  • March 05, 2021

By Monica Jimenez, Posted in Infrastructure, Security

The combinations of authentication apps and thin clients are endless nowadays. With the many different types of technologies out there though, not every combination has been documented. At a recent customer engagement, there was a combination of products that isn’t very common, at least not yet, being implemented in an IGEL environment.  Customer Environment: IGEL devices on firmware 11.04.250.01 using the built-in default Citrix Workspace client are deployed within an environment configured fo... read more.

  • March 02, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/22 Cisco Completes Acquisition of IMImobile PLC By combining IMImobile's solution with Webex Contact Center, Cisco will be able to provide a robust Customer Experience as a Service (CXaaS) offer. http://prn.to/3upfctR Citrix Endpoint Management named a 2021 Gartner Peer Insights Customers’ Choice Citrix Endpoint Management receive an overall rating of 4.5/5.0 stars based on 101 reviews within the Peer Insights category for Unified Endpoint Management, again based on feedback from you, ou... read more.

  • February 26, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/15 Press #1 to Play: A Look Into eCrime Menu-style Toolkits (Crowdstrike) The increasing availability of eCrime “syndication” models proliferating Ransomware as a Service (RaaS) programs grew in popularity as a threat vector and is one of the reasons behind the increasing volume of activity, allowing more novice threat actors to capitalize on the advanced skills of criminal malware developers and move from opportunistic breaches to targeted BGH ransomware campaigns. http://bit.ly/37g... read more.

  • February 19, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/1 Prisma Access Is the Leading Cloud Service to Secure Remote Users (Palo Alto Networks) We are excited that Prisma Access by Palo Alto Networks was the leading cloud-delivered security app by monthly active users, as well as by number of organizations. http://bit.ly/3tAQmH7 How a successful phishing attack can hurt your organization A successful phishing campaign can damage an organization in more ways than one. A report released Sunday by security provider Proofpoint looks at the impact of a... read more.

  • February 12, 2021