Blog & Resources

Don’t Underestimate Insider Threats

On the night of August 24, 410, an army of Visigoth warriors slipped into Rome through the Salarian Gate and proceeded to burn and plunder the great walled city for three days. It was the first time in nearly 800 years that Rome had fallen to a foreign enemy, and historians often cite the event as marking the end of the Western Roman Empire.

How to Develop IT Policies that Address Your Organization’s Specific Needs

In our last post, we outlined nine must-have IT policies for reducing security and compliance risks. (add link when published) Many organizations have responded to the uptick in cyberattacks by upgrading their IT security arsenal. However, the best security technology in the world will have limited effectiveness if you don’t have policies and procedures in place to support an overarching security strategy.

Join Verteks Consulting at the Tampa Data Connectors Cybersecurity Conference on Febrauary 1, 2018

Overview

The Tampa Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.

Verteks Consulting is proud to sponsor FLGISA Winter Conference January 30-Febraury 1, 2018

JOIN US ON JANUARY 30-FEBRUARY 1, 2018
The Florida Local Government Information Systems Association invites you to join us for the 2018 Winter Conference at the Embassy Suites Lake Buena Vista South on January 30-February 1, 2018. The conference is open to all local government employees and technology professionals that want to learn more about technology.

Do You Know Where Your E-Waste Ends Up?

The proper disposal of e-waste is a critical component of any data security strategy. In the past, organizations simply had their server hard drives erased. But think about other places where data is stored in your organization – desktop computers, mobile devices, printers, copiers and various Internet-connected company assets.

The Importance of Employee Training in IT Security

Protecting your IT environment against cyberattack requires a blend of security tools and constant vigilance. It’s important to note, however, that the best security tools on the market cannot stop every security threat. Every employee in your organization needs to understand the critical role they play in preventing cyberattacks and protecting sensitive data.

WatchGuard acquires Percipient Networks to enhance malware & phishing protection

On January 17, 2018, WatchGuard announced acquisition of Percipient Networks, a developer of simple, affordable, automated security solutions for small and midsize organizations. Percipient Networks’ flagship product, Strongarm, stops phishing and malware attacks by offering an easy to deploy, security focused Domain Name System (DNS) service.

What to Look for in a File Integrity Monitoring Solution

Our last post, discussed the risk posed by data tampering. While data theft gets headlines, data modification is an insidious threat that could cripple a business. File integrity monitoring (FIM) is a security control designed to detect the modification of critical data by regularly comparing files to a known, good baseline.

Just released our free eBook, 20 Signs That Your Business is Ready for Managed ServicesDownload
+