
Security
- Security
Endpoint Detection and Response: The Responsible Approach to Remote Access
The advantages that notebook computers, smartphones and other wireless devices bring work and business are beyond dispute. The benefits of these revolutionary tools come at a price, however. As Uncle...
Read MoreSecurityCIS Critical Security Controls – Six “Basic” Strategies to Deliver Immediate and Effective Cyber Defense
Everyone loves a list. This time of the year is full of them: the year’s 10 best movies, 20 best songs, 100 best athletes…you get the idea. Anyone with a...
Read MoreSecurityThe Most Dangerous Threat: The One You Never See
Managed Detection and Response (MDR) Secures Enterprises Inside and Out Today’s advanced security technologies have done an adequate job of protecting network systems from external cyberattacks, but little to prevent...
Read MoreComplianceSecurityCCPA: The 800-Pound Regulatory Gorilla
Ready or not, the California Consumer Privacy Act (CCPA), the hulking silverback of 800-pound gorillas, goes into effect January 1, 2020. How is CCPA like an 800-pound gorilla? The old...
Read MoreSecurityRemote Desktop Protocol (RDP) Vulnerability Exposes Millions of Users
Cyber-criminals take advantage of a familiar sys admin tool They say familiarity breeds contempt, but in the realm of cybersecurity, it also opens the door to vulnerability. Few things inflame...
Read MoreComplianceSecurityWhy Security and Compliance are Easier with a SIEM and a SOC
Decades ago, business security systems replaced on-site security guards, reducing costs and improving total building security. Similarly, a security information and event management (SIEM) can improve the security of your...
Read MoreSecurityCity Systems Easy Pickings
Cybercriminals See Municipalities as Low-hanging Fruit for Ransomware Attacks For two weeks in mid-June, hackers held Lake City hostage. A ransomware attack locked down the north-central Florida municipality’s entire computer...
Read MoreComplianceSecurityDFARS NIST Compliance Requirements: What Government Contractors Need to Know
Today’s government contractors face many challenges to remaining competitive and innovative while managing advanced information technologies and maintaining regulation compliance. Among those challenges is the increased risk of cyberattacks by...
Read MoreGeneralSecurityThird-Party Data Breaches — What to Consider When Outsourcing IT
Over-worked, over-budget and overwhelmed — such conditions plague most modern enterprises in today’s fast-paced, rapidly evolving IT environment. No wonder many businesses turn to outside help to manage their IT...
Read More