New York State Cybersecurity Regulation

Effective March 1, 2017, the Superintendent of Financial Services promulgated 23 NYCRR Part 500, a regulation establishing cybersecurity requirements for financial services companies. August 28, 2017 marks the deadline for implementation.See more key dates of the regulation here.
Red Flags of Phishing Attacks

Back in the early days of the Internet, phishing emails were full of typos and laden with obvious clues—appeals from faraway princess or rich relatives you never knew you had. These were very easy to spot.
Back Up to Move Forward

IT leaders already know that you need to have a range of data recoverability options in place in case of a cyberattack? According to ESG, backup should absolutely be the foundational cornerstone of every data protection strategy.
Types of Network Security Threats and How to Combat Them

If you’re interested in the types of network security threats and how to combat them, you’re in the right spot. We’ll discuss a tried and true method to create a solid foundation for your network security.
Continuous Network Monitoring like a…Fitbit?

The single best analogy for continuous network monitoring: Fitbit. What does this mean and what can a Fitbit tell you about continuous network monitoring?
How to Avoid Cybersecurity Scams in the Real Estate Industry

Cybercriminals are targeting and attacking real estate professionals because of the amount of personal and confidential information that is stored and exchanged on their personal devices.
3 Steps to Improve Network Security Threat Detection

Network security threats are continuously growing in quantity and severity. How can you protect your secure data? Here are three easy steps to improve your network security threat detection.
Top 10 Clicked Phishing Emails

Our security awareness training partner, KnowBe4, recently released the Top 10 Global Phishing Email Subject Lines for Q2 2017 report. The list below shows the subject lines of the phishing emails that are top clicked of all global phishing emails:
Disaster Recovery Strategy in 5 Steps

Disaster Recovery is important, especially to SMBs. The big guys can take an occasional hit—but smaller guys can’t afford the loss. The tangible costs of a downtime-inducing disaster are real, and for some, they’re devastating. A recent survey of IT professionals produced some sobering expectations…
Watch Your Back: Why You Must Have A SIEM

Technology creates a lot of information, and it typically leaves a record of what it has performed in log files. Whether it’s your router, switch, server, virtualization platform, cloud provider, smart phone, or printer a trail of events and information is created like a receipt you would get from grocery shopping. Unfortunately, the logs are often forgotten, or commonly never analyzed unless there is a major problem. E