Category: Security

Open hotel door

Unwelcome Guests: What is Dwell Time in IT Security?

 |   |  Security

Dwell time, in the context of IT security, is the number of days a threat remains undetected within a given environment. Why does this matter as a metric? The amount of time that a system has been compromised can impact the overall severity of the security event in several ways.

Read More >

Ransomware

Ransomware: It’s Still a Thing

 |   |  Security

Are you tired of hearing about ransomware? We are too, but unfortunately, ransomware is still a thing. Anyone can be affected by a ransomware attack. There is no industry discrimination. It does not matter what size your company is, or what role you’re in. I’m sure you have seen or read about the recent ransomware attack in the Capital Region. Events like this are happening every day, both globally and right in our very own backyard.

Read More >

Microsoft CVE-2019-0708

CRITICAL SECURITY ALERT: Microsoft Vulnerability CVE-2019-0708 (BlueKeep)

 |   |  Security

Microsoft has announced the discovery of a vulnerability that is present on Windows XP, Server 2003, and Server 2008 systems. Due to the seriousness of the vulnerability, Microsoft has released a patch for those operating systems, despite their currently unsupported status. This patch also impacts Windows 7 and Server 2008 R2, which are still under the support of Microsoft.

Read More >

Mind the Gap warning on platform

Compliance: It’s Not Just for Healthcare

 |   |  Business & Strategy, Security

Almost every business has some sort of need based around compliance – a set of guidelines commonly determined by industry. These guidelines, laws and best practices are put in place to protect your business, your clients and your partners, and the critical information being shared. Here is an overview of some of the most common compliance regulations organizations may fall under, and examples of how these regulations could impact your business.

Read More >