By Gotham, Posted in Security

This is a guest blog from Proofpoint, a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. Today’s organizations face a variety of challenges and security risks, ranging from ransomware to phishing campaigns. For this reason, many organizations invest significant time and resources to detect and prevent external threats. But one area that is often overlooked is the insider threat. There are three primary types of insider threats: Malicious:... read more.

  • September 20, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/13 So your company just upgraded to Citrix Workspace. Now what? Citrix Workspace comes with a suite of tools to make your job easier — and your employees’ jobs. Now you can manage web and SaaS apps alongside the Windows apps you’ve been managing within Citrix Virtual Apps and Desktops. New Application Security Report Outlines the Biggest Challenges for DevSecOps (Fortinet) For business-critical workflows, organizations look to enable access from any dev... read more.

  • September 17, 2021

By Timothy Karl, Posted in Infrastructure, Storage, Support

One of the common issues I see in VDI are FSLogix profile disks taking up a lot of space. Users’ profiles grow organically over time as they use VDI. If an IT administrator doesn’t monitor and perform regular maintenance on the profile shares, they can run out of space. When this happens, users are unable to log on and active profiles start to become corrupted. Adding more storage can temporarily get things back online; however, that might not always be an option as adding more storage and expan... read more.

  • September 16, 2021

By Michael Hawkins, Posted in Security

It is worth revisiting some of the basics of ransomware in order to remind ourselves of why we need so many security controls to protect against it. How does ransomware get into our computers? The most common path is through an email that contains attachments that are infected with the malware. In this scenario, infected PDF files are very common, but Microsoft Word and Excel files and other types are seen also. Another common infection path is browsing to an infected web site. These sites will usually pop... read more.

  • September 13, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/30 What’s new with Citrix Workspace – August 2021 Recently, our teams have added new features and solutions associated with some of our most popular services. These are designed to improve the hybrid experience. Let’s dive in and take a closer look at what’s new with Citrix Workspace for August. Pandemic-Related Email Scams Are on the Rise (Proofpoint) As vaccines became widely available in the spring and early summer, COVID concerns dwindled dram... read more.

  • September 10, 2021

By Nancy Rand, Posted in Security

The PCI Council has published a series of blogs on payment data security as part of their task force for small merchants.  Topics include: Back-to-Basics: Think Before You Click Back-to-Basics: Properly Configured Firewalls Back-to-Basics: Secure Remote Access Back-to-Basics: Use Strong Encryption Back-to-Basics: Keep Software Patched Back-to-Basics: Use Strong Passwords Back-to-Basics: Reduce Where Payment Data Can Be Found PCI SSC Shares Resources for Navigating Changing Payment Environmen... read more.

  • September 08, 2021

By Nancy Rand, Posted in Infrastructure, Security

On August 5, 2021, the PCI DSS Council and the Cloud Security Alliance (CSA) issued a joint statement on the importance of cloud scoping. Best practices focus areas are discussed: Data protection, Authentication, Systems management, DevOps & DevSecOps, Data governance and Resiliency. These best practices are important to the security of clou... read more.

  • September 02, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/23 Check Point Research: Education sector sees 29% increase in attacks against organizations globally Check Point Research (CPR) today reports that since mid-2020, we are seeing a steady increase in the weekly number of cyberattacks per organization globally, with the education/research sector being impacted at a higher rate than others. The Need for Endpoint Security Isn't Going Away (Fortinet) The combination of the work from anywhere workforce and the growing sophisti... read more.

  • August 27, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/16 Breaking Down STEM Perception Barriers and Tackling a Career in Cybersecurity (Fortinet) Fortinet profiles two women in cybersecurity, cybersecurity career interns Taylor Leslie and Claire Smerdon, who speak about what interested them about a STEM career in cybersecurity, what obstacles they have faced, and what they think we can do to help break down perception barriers. What to Do After Responding to a Phishing Email (Proofpoint) Phishing emails can target anyone wi... read more.

  • August 23, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/9 Extortion Payments Hit New Records as Ransomware Crisis Intensifies (Palo Alto Networks) The ransomware crisis continues to intensify as criminal enterprises boost investment in highly profitable ransomware operations. CISA Launches New Joint Cyber Defense Collaborative CISA is establishing the JCDC to integrate unique cyber capabilities across multiple federal agencies, many state and local governments, and countless private sector entities to achieve shared objective... read more.

  • August 13, 2021