Recent High Profile Security Breaches and Takeaways

By Greg LaBrie |   Jul 25, 2017

There’s a lot to learn every day in the world of technology, especially with the ever-increasing amount of high-profile cyber breaches and criminal hacks. It seems every news article brings a new security scare, and businesses should be more alert than ever before. Want to know what threats are out there? Read on for an overview of recent security breaches, and find out what your organization can learn from them.

How to stop the latest cyber security threat, “Petya”

By Michael Thweatt |   Jun 29, 2017

Remember the destruction WannaCry caused? The casualties included up to 300,000 encrypted computers in over 150 countries, not to mention the damage or loss of data entirely. The newest ransomware cyber-attack threat is far worse than WannaCry, and it's going by the name “Petya.”

Exploring Different High Availability Architectures and Solutions

By Greg LaBrie |   May 30, 2017

Every data center, application environment, enterprise organization, and cloud provider would probably like nothing better than to achieve “zero downtime” for all of their operations. High availability (HA) architecture can provide the flexibility and reliability that you’re seeking for backup and recovery solutions.

Lessons Learned: High Profile Enterprise Security Breaches

By Michael Thweatt |   May 16, 2017

Nearly every day, there is a new cybersecurity breach to announce; businesses should be more alert than ever before. In 2015, the Ponemon Institute and Symantec discovered that a whopping 47 percent of U.S. data breaches were the result of a malicious insider or criminal cyberattack. Read on for an illuminating look into recent high-profile cases, and what you can learn from them.

Enterprise Mobility: Securing your Data in a Mobile World

By Greg LaBrie |   May 02, 2017

Today’s enterprise is mobile, flexible and elastic. Many organizations utilize mobile apps for business applications, hire remote employees, use smartphones or tablets, store information in the cloud, communicate their data with multiple offices and employ contractors. All of these cases rely on access to data from any location. With all of these endpoints to cover, how can you best protect your assets?

Fixing One of the Biggest Holes in Data Security

By Michael Thweatt |   Apr 27, 2017

Unsecured printing and imaging leads to security breaches, putting organizations at risk of costly lawsuits and public relations nightmares.

Today’s printers can connect to wireless networks, scan and send documents, store data on hard drives, and even produce 3D materials. They have many of the same capabilities—and the same vulnerabilities—as computers. As their features increase, so do the opportunities for security breaches in the printing process.

Avoid a Whaling Attack: Recognizing 3 Common Security Risks

By Greg LaBrie |   Dec 22, 2016

We recently discussed an emerging cyber threat called whaling, a new highly-targeted phishing tactic that’s threatening enterprises’ most valuable employees: the C-Suite. While whaling is similar to any other phishing or spam email scam, it’s a tactical approach that takes its time by targeting high-level executives by leveraging what seems to be legitimate business correspondence. How can you recognize a whaling attack before it infiltrates your organization? Read this post to get to know the common security risks.

Cyber Attacks: Why Malicious Insiders are a Top Threat

By Kerry Cotter |   May 19, 2016

There are several different ways your current employees can knowingly or inadvertently bypass your security; while all can wreak havoc with your systems and cause irrevocable damage, those with malicious intent in mind are by far the worst. Understanding the different levels of threat and what may motivate these insiders can help you create strategies that truly mitigate your risk.

Concerned about Password Security? Amp up data security.

By Michael Thweatt |   May 05, 2016

At least once a year, you can find a report on the web about what the most common passwords are based upon leaked data. Think of these lists as the worst passwords you can ever use. Typically, 123456 and password top the list. Coming up the path of popularity are passwords 123456 and 123456789, as people are required to enter in longer passwords. Need a mix of letters and numbers? You might want to avoid abc123 and trustno1, among many others. Nowadays, a password security alone isn’t sufficient to lock anything down. How best can you secure your system to keep the bad guys out?

Get to Know the Real Threats to your Company’s Data Security

By Michael Thweatt |   Apr 14, 2016

Did you know that your data could be compromised at this moment, even if none of your security measures have sounded an alarm? As companies across the nation reported data breaches throughout the past few years, one commonality was noted: in most breaches, the data was compromised for weeks or even months before anyone noticed. When you couple that fact with some of the expectations for data security in the coming years, you realize that both internal and external security in most organizations has to evolve if it’s going to do any good.

Avoid Security Breaches with Data Protection Technology

By Greg LaBrie |   Apr 12, 2016

Every few years a new encryption algorithm is released by an IT solutions provider to ensure your data stays safe. Hardware keeps improving, making older encryption algorithms easier to break. Thus, new encryption mechanisms are needed to keep your systems and data safe.

Avoiding the Advanced Persistent Threat through Hardware

By Kerry Cotter |   Mar 31, 2016

Once upon a time, it was safe to turn your computer on. Nowadays, a month, week, or even day doesn’t go by where you hear about the latest system attack and zero-day exploit used to install malware and expose data from somewhere across the globe. Some news reports even say the NSA is buying these exploits to take advantage of them before they’re patched to gain access and potentially disrupt computer systems. If the US government is doing it to attack their enemy, you can be sure other governments and organized crime are doing the same to potentially get into your systems. A chain is only as strong as its weakest link and the least protected computer system will be found and exploited.

Intelligent Security Solutions for Internal Access

By Michael Thweatt |   Mar 24, 2016

Managing internal access to data and software has always been a challenge for technical and security departments. In the past, security was often managed physically; workers couldn’t access what they couldn’t physically get to. Today, cloud computing and the need for employees of all levels to access data from disparate locations makes physical controls outdated in most industries. Instead, organizations are turning to a variety of cloud, software, and hardware-based security solutions, some of which are less effective than others.

The Importance of Data Encryption

By Kerry Cotter |   Mar 22, 2016

Is your business utilizing data encryption in your security strategy? The process of changing information to make it unreadable to those except authorized users can help your company securely protect data and safeguard it from potential threats. Businesses use data encryption to protect personal information, customer data, trade secrets, employee files, tax information, credit card numbers and more. This benefits the network is breached. Read on to learn about the benefits of data encryption.

3 Common Cloud Security Mistakes

By Joshua Satrape |   Mar 15, 2016

Not long ago, many organizations were reluctant to adopt cloud technologies mostly due to concerns about security and loss of data control. After all, the traditional approach to network security is heavily focused on protecting the network perimeter. How do you do that when the Internet is being used to interact with applications, services, and data? It’s no surprise that enterprises were a bit unsettled with the idea of sharing the responsibility of security and privacy with cloud providers.

3 Information Security Trends Every Company Should Know

By Kerry Cotter |   Mar 08, 2016

The technology industry is rapidly evolving, changing and growing; it’s important to stay up to date on current trends, and even brush up on skills well in advance of needing them, so you are prepared when emerging and disruptive technologies sweep the industry. Read on for three information security trends to be aware of in 2016 so your company can best prepare against potential hackers and cyber criminals.

4 Tips for Data Security in the Cloud

By Greg LaBrie |   Feb 09, 2016

Are you concerned about the security of your business’ data in the cloud? You aren’t alone. While cloud computing offers many advantages (several of which include security benefits,) it also can be seen as a gray area for IT pros who are seeking full and secure control of their data. Read on for four data security tips for your business' information in the cloud.

Protect your data the right way

By Kerry Cotter |   Jan 14, 2016

Making sure you protect your data is essential in making sure your protocols are effective. With technology continuously evolving, data breaches are becoming more common, exposing confidential information to the masses. It is important to have a defense system in place that can counteract these breaches, but the challenges that face IT security personnel keep growing.

Although there are many solutions on the market that assist in defending servers and data, there are a number of elements that could potentially suffer, such as performance and user experience. This creates a barrier between security and performance, where there should be cohesion. The challenge remains in keeping data safe, reducing risk, and keeping the level of performance high.

Data protection: The gap between accessibility and security

By Michael Thweatt |   Jan 07, 2016

An enormous challenge for technical and security departments within any organization is creating secure networks, apps, and servers without making access so difficult that legitimate production is impacted. This is true whether you are working with in-house employee-based systems or customer-facing solutions such as web portals or online account management. The consequences for not securing information are huge, ranging from federal or state sanctions to loss of customers or customer trust. At the same time, results of the wrong type of security or unnecessary security might include loss of productivity, inability to make deadlines or complete work, poor employee morale, and loss of revenues. Data protection is key, but how can you ensure you have the right solutions in place?

    About WEI

    WEI is an innovative, full service, customer-centric IT solutions provider. We're passionate about solving your technology challenges and we develop custom technology solutions that drive real business outcomes.

    Subscribe to WEI's Tech Exchange Blog


    Categories

    see all
    Contact Us