Blog & Resources

Improve Threat Detection and Response with WatchGuard

In a recent post, we described many of the techniques that malware authors are using to disguise their attacks. In this post, we’ll take a closer look at how WatchGuard Technologies uses data analytics to identify and expose these stealthy exploits.

As described in the earlier post, cybercriminals today employ code obfuscation, polymorphism and other techniques to create malware that can constantly change its identifiable features.

Protect SaaS Data with Cloud-to-Cloud Backup

Software-as-a-Service (SaaS) is rapidly becoming the preferred choice for new software deployments as organizations seek the flexibility and cost benefits of the cloud delivery model. One recent study finds that organizations now use an average of 16 SaaS business applications and plan to increase that number substantially over the next three years.

Aging Firewalls Create Risk

Outdated perimeter defenses offer minimal protection from sophisticated new cyber threats.

Firewalls have been the linchpin of network security for decades, serving as the essential gatekeeper between internal network resources and the outside world.

Reliability Is Key

SMBs say reliability is the first thing they seek when choosing a cloud-based phone system.

There are a lot of good reasons for putting your phone system in the cloud. It saves capital costs, offloads much of the phone system management burden, creates access to advanced features and is extremely scalable.

Government Agencies Seek Modernization with Hybrid Cloud

Bloomberg analysts report that cloud computing will be the top government IT spending category over the next several years. Most government CIOs say this is a welcome development. In an age of increasing digitization, government agencies are finding it difficult to support their constituents with aging infrastructure.

Office 365 Security – Top 5 Security Steps

Office 365 is a great cloud productivity suite that brings benefits to all its users – I use it myself and I love it. As with any technology it’s important to evaluate cyber security risks and take appropriate measures to reduce risk and improve security. Based on my experience and what we’ve seen in client engagements, here are my top 5 cyber security recommendations for Office 365:

Cybersecurity 2020: Focus on These Five Threats

As we approach the new year, information security consultants, analysts and futurists are once again attempting to identify the threats most likely to create damage in the coming months. While emerging threats such as AI-powered bots, deep-fake videos and 5G network attacks are among the trendy picks, a variety of old, familiar vulnerabilities will likely pose the greatest risks to businesses in 2020.

McAfee analysts claim that more than 300,000 new pieces of malware are created daily, but most of these are just tweaks of existing threats that are proven money-makers for cybercriminals.

Are You Confident that Your Cloud Data is Secure?

While early adoption of the cloud was driven largely by a desire to reduce capital expenses and management overhead, organizations are now moving to the cloud for strategic purposes. Users can be more productive because they have the flexibility to access cloud resources, collaborate with co-workers, and serve customers from any device and location.