Multifactor Authentication Can Ease ‘Aftershock’ Attacks

Earthquakes typically produce a series of smaller quakes in the same area long after the original. These “aftershocks” vary in intensity and can continue over a period of weeks, months or even years. Information security experts now believe that companies should be prepared for similar long-lasting reverberations following a number of high-profile data breaches.

The Danger of Rogue Access Points and BYON

When the CIO of the Department of Transportation (DOT) launched a project to implement Microsoft Office 365, he quickly discovered a big problem. No one had ever really designed the department’s network — end-users simply installed networking equipment as needed.

What Does an Effective Endpoint Security Strategy Look Like?

It was only a matter of time before the rise of mobile led to the rise of mobile security threats. From smartphones and tablets to wearables and Internet of Things devices, the number and variety of endpoints have made it difficult for organizations to maintain control over mobile environments and deliver security updates in a timely fashion.

Redundant SD-WAN Links Can Help Mitigate DDoS Attacks

Distributed denial-of-service (DDoS) attacks are becoming easier to launch, harder to stop and larger than ever, according to a new report from Deloitte Global. The consulting firm anticipates that more than 10 million such attacks will occur in 2017.

Gone are the days when low-level hackers used DDoS attacks to make a political statement or simply for their personal amusement.

9 Tips for Thwarting Emerging Threats

The security landscape is continually changing, and our last post described a few of the latest threats cybercriminals are employing in their efforts to compromise your networks and endpoints. As threats evolve, organizations must continue to employ a variety of strong countermeasures.

As Technology Evolves, So Do Threats

Technology is evolving at a rapid pace, with mobile, cloud, analytics and other big initiatives driving significant shifts in the IT world. Rest assured that cybercriminals are doing their best to keep pace.

Security experts predict that malicious threat actors will differentiate their tactics in the coming months in order to capitalize on the changing technology landscape.

Balancing Security and Performance with Unified Threat Management, Part 2

In the previous post, we discussed why adoption of unified threat management (UTM) solutions is accelerating, particularly among small and midsize companies that need a holistic, easy-to-manage security solution. By combining multiple security features in a single appliance, UTM enables a defense-in-depth strategy without the need to deploy and manage multiple appliances.

Just released our free eBook, 20 Signs That Your Business is Ready for Managed ServicesDownload
+