Category: Security

author:

Security

Help Protect Your Company From a Data Breach

April 10, 2019

It’s likely no surprise to anyone that the amount of data collected, stored, and analyzed continues to grow exponentially across the globe. From a security perspective, it’s always important to minimize the amount and sensitivity of data stored, but the reality is, if the …



Podcast Security

Steps to Proactive Cybersecurity—SolarWinds TechPod 006

March 14, 2019

Ready to implement or expand a successful security  program for your customers? In this episode of SolarWinds TechPod, SolarWinds VP of security Tim Brown and senior channel sales specialist Stefanie Hammond discuss the steps you can take. Related Links: 10 Steps To Proactive Security …


author:

Security

7 Steps to Build an Effective Cyberincident Response Process

March 6, 2019

As an IT security professional, you work hard to prevent cyberattacks. You patch your systems regularly, update antivirus libraries, run user trainings, and lock down user access to sensitive systems and data. You’re the poster child for solid cyberhygiene. Despite all the money you …


author:

Security

A Frank Discussion of Multifactor Authentication

February 20, 2019

Someone steals credentials from one of your client’s executives. They guess the username and password to their email account. From there, the cybercriminal can send out targeted phishing emails to compromise even more accounts or trick employees into handing over sensitive data. To combat …


author:

Security

IT Operations: How SecOps Saves the Day

February 13, 2019

Few messages strike fear in the hearts of IT operations staff like the dreaded scan results from your security team. These messages often appear in your inbox early on Monday morning, which means it’s sitting there waiting for you. You’re not even into your …



author:

Security

Moving Toward More Proactive Cybersecurity

January 23, 2019

As the cyberlandscape continues to evolve, so do the methods of attack used by cybercriminals. And it isn’t just outsiders you have to worry about; insiders can be responsible for data breaches too. Given all the moving pieces, it’s no wonder the state of …


author:

Security

Three SIEM Must-Haves

December 19, 2018

Many businesses need to increase their security game. You can put all the preventive measures in place that you want—like patching, antivirus, mail protection, and firewalls—yet threats can still slip past defenses. According to the recent Ponemon 2018 Cost of a Data Breach report, …