The Reason Why Global Ransomware Attacks Will Continue

By Greg LaBrie |   May 18, 2017

Last year, ransomware became a $1 billion dollar industry. If ransomware were a traditional legitimate industry it would be the focus of case studies for business schools at colleges and universities across the world. Its exponential growth has been unprecedented and its nefarious means of encrypting one’s data files to garner ransom has captured the headlines of newspapers, journals, blog sites, and news channels. One billion dollars brings a lot of attention and spotlight to something.

Lessons Learned: High Profile Enterprise Security Breaches

By Michael Thweatt |   May 16, 2017

Nearly every day, there is a new cybersecurity breach to announce; businesses should be more alert than ever before. In 2015, the Ponemon Institute and Symantec discovered that a whopping 47 percent of U.S. data breaches were the result of a malicious insider or criminal cyberattack. Read on for an illuminating look into recent high-profile cases, and what you can learn from them.

New Malware Keeping IT Managers Up at Night

By Michael Thweatt |   May 09, 2017

With the wide range of reported cybersecurity incidents and hackers getting more creative than ever before, there is no shortage of threats to the modern enterprise. IT managers must not only secure current data and systems, but preemptively protect against ongoing future threats, which are constantly evolving. While there are well-known versions of malware, “Tellingly, WatchGuard’s inaugural Internet Security Report found that some 30 percent of malware in Q4 was new, or ‘zero day.’ (Not to be confused with zero-day exploits.) In other words, one-third of malware identified wouldn’t be caught by legacy antivirus solutions,” according to PYMNTS.

Fixing One of the Biggest Holes in Data Security

By Michael Thweatt |   Apr 27, 2017

Unsecured printing and imaging leads to security breaches, putting organizations at risk of costly lawsuits and public relations nightmares.

Today’s printers can connect to wireless networks, scan and send documents, store data on hard drives, and even produce 3D materials. They have many of the same capabilities—and the same vulnerabilities—as computers. As their features increase, so do the opportunities for security breaches in the printing process.

Protect Your Enterprise with More Cybersecurity Smart Moves

By Greg LaBrie |   Apr 25, 2017

We recently shared five smart moves for IT leaders to focus on when creating an effective cybersecurity strategy. They included basic care like updating an employee security policy and avoiding physical theft, but they also covered monitoring digital footprints in order to thwart malicious insider threats. In this blog post we dive into some additional risks your organization may be facing, and what you can do to stop them.

5 Smart Moves for Your Enterprise Cybersecurity Strategy

By Greg LaBrie |   Apr 18, 2017

In a complex technological world that faces an ever changing threat landscape, the team in charge of managing cybersecurity may find it difficult to know where to focus their often limited resources. Some areas, such as firewalls and operating system updates, are obvious priorities. But what else deserves your attention?

Enterprise Security and Advanced Persistent Threats (APTs)

By Michael Thweatt |   Apr 13, 2017

How good are your enterprise’s security defenses? Today’s hackers have access to an arsenal of tools for carrying out targeted attacks, thanks in part to an anonymous and hidden area of the internet called the Dark Web (also called Deep Web or Darknet). Payment for purchases made there is typically in the international digital currency Bitcoin, which offers a fairly high level of privacy.

Advice for Managing Common Cybersecurity Risks

By Michael Thweatt |   Mar 07, 2017

The job of an IT professional is challenging, especially since strengthening cybersecurity is constantly a moving target. With attackers trying new approaches and getting stronger with their tactics every day, protecting an enterprise’s data and information is more crucial than ever before. How can you ensure you’re covering all of your security bases? Start with managing the most common security risks, which are described in this article.

Enterprise Security in 2017: Comparing 2016 Threats to Now

By Kerry Cotter |   Jan 17, 2017

If you have had the chance to read any of the latest analyst predictions for 2017, then you will have noticed that security remains at the top of the list. So what will you do differently this year than in year's past? As you review your security strategies and revisit best practices this New Year, it’s important to reflect upon the past. We examined the top security threats last year in our white paper, Effectively Managing Cyber Security: Top 5 Enterprise Threats. Now read on to learn about the top five enterprise security threats to the confidential and proprietary information on your network -- that you must consider for this year.

The Critical Role of Hardware-based Security Solutions

By Kerry Cotter |   Jan 12, 2017

How are your security protocols working? While most businesses are focusing on the type of software being used to keep cybercriminals out of the servers, Intel and its partners are working to change the face of security and working together to achieve better results.

Avoid a Whaling Attack: Recognizing 3 Common Security Risks

By Greg LaBrie |   Dec 22, 2016

We recently discussed an emerging cyber threat called whaling, a new highly-targeted phishing tactic that’s threatening enterprises’ most valuable employees: the C-Suite. While whaling is similar to any other phishing or spam email scam, it’s a tactical approach that takes its time by targeting high-level executives by leveraging what seems to be legitimate business correspondence. How can you recognize a whaling attack before it infiltrates your organization? Read this post to get to know the common security risks.

Avoid the Latest Enterprise Security Threat: ‘Whaling’

By Greg LaBrie |   Dec 20, 2016

There’s a new kind of threat to your enterprise, under the phishing and spam umbrella, and that danger is referred to as whaling. Specifically designed attacks target your most valuable team members, the boardroom executives, and infiltrate your enterprise to a scary extent. How can you avoid whaling? Read on for our cyber security threat briefing.

2016 Has Been a Banner Year for Ransomware

By Kerry Cotter |   Dec 06, 2016

As we look back at the year that was, one cannot ignore the growing prominence of Ransomware within the IT Security community. The dramatic surge of ransomware attacks has been outlined within headlines all across the country as cyber criminals continue to perfect this method of extortion in which no person or organization appears to be exempt from today.

Importance of Security and Threat Prevention Assessments

By Greg LaBrie |   Feb 25, 2016

IT leaders have worked hard to keep their networks safe. With the right systems, solutions and policies in place, the concern about data security should diminish, right? Not exactly. Plenty of companies have gone above and beyond to secure their networks, although it seems that a breach is inevitable given that so many major corporations and brands have been compromised in the past few years. Hackers continue to evolve and so must a company’s security strategy.

 

Do Your Security Solutions Work as a Team?

By Kerry Cotter |   Feb 11, 2016

Every organizational leader knows the value of teamwork. When the various parts of your team work together, they can get more done with less, meet seemingly impossible goals, and stand up to enormous obstacles. What you might not realize as an IT leader is that your security solutions can deliver the same results if they also work as a team. While you don’t have to coach programs and hardware as you would a human team, you do have to choose solutions wisely and integrate them in a way that maximizes efficiency and effectiveness.

4 Tips for Data Security in the Cloud

By Greg LaBrie |   Feb 09, 2016

Are you concerned about the security of your business’ data in the cloud? You aren’t alone. While cloud computing offers many advantages (several of which include security benefits,) it also can be seen as a gray area for IT pros who are seeking full and secure control of their data. Read on for four data security tips for your business' information in the cloud.

    About WEI

    WEI is an innovative, full service, customer-centric IT solutions provider. We're passionate about solving your technology challenges and we develop custom technology solutions that drive real business outcomes.

    Subscribe to WEI's Tech Exchange Blog


    Categories

    see all
    Contact Us