Why Cybercrime Groups Become More Active During the Holidays

Why Cybercrime Groups Become More Active During the Holidays

Less than two weeks before Christmas, Mayor LaToya Cantrell of New Orleans declared a state of emergency after she was informed of a major cyberattack on the city’s networks. Following the advice of IT security managers, Mayor Cantrell ordered an immediate shutdown of municipal data centers, servers, hybrid cloud networks, and even internet-connected client devices.…

Details
Real-World Network Security Testing for Business Owners

Real-World Network Security Testing for Business Owners

The fourth and final season of “Mr. Robot,” the gritty techno-thriller series broadcast on the USA cable television network, will come to an end in the next few months, and it will likely be remembered for its highly realistic portrayal of cybercrime. The production team behind “Mr. Robot” insisted on making hacking scenes, which ranged…

Details
Designing a Modern Data Center for Your Office

Designing a Modern Data Center for Your Office

More than a decade has passed since cloud computing became the new paradigm of enterprise data networks. What was once considered to be a cutting edge solution is now a business standard, and the days of client/server office networks are mostly over. Modern business networks operate as data centers; whether you keep servers on-premise or…

Details
The Importance of Secure Email Hosting

The Importance of Secure Email Hosting

When former United States Special Counsel Robert Mueller testified before Congress in July 2019, information security experts paid attention to his testimony for reasons that were more technical than political. One of the various matters that Mueller investigated during his tenure was the hacking of email accounts operated by the Democratic National Committee as well…

Details
Legacy Wired Networks Are Hardly Obsolete in 2019

“Legacy” Wired Networks Are Hardly Obsolete in 2019

When modern business owners think about network infrastructure, they tend to gravitate towards wireless solutions, and this preference is very easy to understand; after all, wireless is what we have become accustomed to in our homes, schools and public spaces, but traditional wired networks should not be discounted as relics. Physical networks are still being…

Details
Understanding Hybrid and Private Cloud Systems

Understanding Hybrid and Private Cloud Systems

Cloud computing, at least as we came to know it during its inception in the late 1990s, has changed significantly. When most people think about “the cloud,” they have a vision of public cloud computing, which encompasses popular services such as Microsoft Office 365, Google’s G Suite for business productivity, and Software-as-a-Service solutions such as…

Details
What You Should Know About Endpoint Security

What You Should Know About Endpoint Security

Network specialists and hackers have different views of endpoints. In essence, endpoints are devices that connect to networks; network specialists see them as gateways while hackers see them as potential targets. When it comes to information security, experts see endpoints as both targets and gateways, and this is the view you should adopt as a…

Details
Information Security Lessons From the Marriott Data Breach

Information Security Lessons From the Marriott Data Breach

In December 2018, news about a massive data breach of networks used by Marriott International prompted United States Secretary of Commerce Wilbur Ross to comment on the matter. In response to a question presented by financial news network CNBC about the Marriott incident, which compromised the personal information of up to 500 million hotel guests…

Details
E-commerce Business Owners Should be Vigilant During the Holidays

E-commerce Business Owners Should be Vigilant During the Holidays

Even though Black Friday and Cyber Monday are generally known as the busiest shopping days of the year, a heavy online retail activity is expected to continue throughout Decembers, and this translates into a greater potential for cybercrime. Data breaches and network intrusion attacks are often launched against e-commerce websites during the holidays, and this…

Details
Understanding HIPAA Server Compliance

Understanding HIPAA Server Compliance

One of the main goals of the Health Insurance Portability and Accountability Act is to protect the privacy and integrity of patient health information, particularly when it is handled in electronic formats. Business entities that deal with protected health information in the United States are expected to comply with certain HIPAA guidelines, and this goes…

Details