How Safe is VMware?

Do you remember back in College when you felt invincible logging into the computer lab and booting up your personal virtual machine? You almost felt invisible to the world. Your instructors told you that this is the proper way to play around the internet, also how to test and break things. Being able to download, surf the web and run malicious labs without affecting anything on you’re the actual computer was the coolest thing since the invention of the computer itself. Well according to a recent article published by the virtual machine giant VMware, this security may not be the same as it used to be.

Read More

Have You Heard About the Rash of Unpacker Errors Within Sandboxes?

Have you ever built a sandbox environment or someone at your company has built one and it is time to download and unpack the updates for some of the different systems within the sandbox. All of a sudden you get an unpacker failed error come across the screen. The solution is quite simple but what most people struggle to understand is that there are two type of Unpacker errors to solve for. Unless you are the exact person who created the sandbox, you may not even know the difference yet. The two different types of unpackers are a single user remote repository and a multiple user remote repository.

Read More

Cyber Security: Myth vs. Reality

The phrase “cyber security” has a catchy ring to it and instantly evokes feelings of relief and safety for business managers who haven’t taken the time to research what it actually means. Small businesses with tight budgets are at the most risk of taking low cost security strategies for granted. Here are reasons for all business professionals to raise their awareness about this fragile topic.

Read More

Is Your Wifi Open to the World?

Wireless networks have made browsing the internet much more simple and efficient than used to be the case. Although broadband connections were a major upgrade over the slow and pestering dial-up connections that made using the internet more of a punishment than getting the job done, they still had the problem of providing multiple-connectivity. The problem with wired networks is that only one user can use it at a time.

Although one might say that that one device could be used to create a hotspot and other devices could connect to a single wired network in principle, the fact still remains that hotspots are a form of wireless networks too. Anyhow, it is known to all that Wi-Fi networks allow the capability to have multiple connections and enable people to browse the internet and get a lot done. However, it is important that you have a Wi-Fi network that is not open to all people. Before going into why it is so, we first take a look at how to tell if your Wi-Fi is open.

Read More

Top Cloud Computing Security Risks for SMB

Small and medium-sized businesses (SMBs) are turning to the cloud for the mobility and affordability it provides. However, SMBs can fall victim to cloud security risks if they aren’t vigilant enough. According to Trend Micro, one of the biggest threats for SMBs when using the cloud is data breach which can be caused by either stolen or hacked devices. Data can be lost — or worse, leaked into the wrong hands — in this scenario. Fortunately, there is a way to combat this cloud security risk, and that’s to choose cloud service providers that offer remote wipe of data in case a device gets compromised.

Read More

The Three Tiers of Cyber Security

System infrastructure for cyber security is commonly divided into three tiers of infrastructure that breaks it down into separate silos presentation, applications processing and data management. This foundation of three modules that was developed by Open Environment Corporation (OEC), allows developers to exercise flexibility in reusing, replacing, adding or modifying software functions to client-server architecture.

Read More

Should You Use an App for That?

In the fast growing “internet of things” technology world we live in, apps are popping up left and right to help make life easier. There are apps for everything you could think of, restaurant searching, booking a taxi and even some meaningless for your entertainment. With the temptation right in front of you, claiming that it will completely solve your current issue whether it be boredom or hunger, you simply shouldn’t trust every app that is out there.

Read More

Does Your Company have a Cyber Security Policy?

Does your company have a Cyber Security Policy? If you have not already established a policy that protects both your company and its employees from possible threats, then now is the time to put it in place before you are taken unawares by a cyber attack or by unauthorized access or publication of proprietary and confidential information.

Read More

Wearable Technology: Are You Aware of the Vulnerabilities?

The Technology industry is advancing quicker than the consumers can keep up with it. Which is a great thing for the economy but not so much for the world of security. With all the new wearable gadgets that track things like number of steps and heartrate to your GPS location, there is no room for error when securing there devices from malicious eyes. The following are some popular devices and their associated vulnerabilities

Read More

The Cybersecurity Labor Gap; Not Enough Trained People is a Big Issue!

The world of technology is growing rapidly every day and so are the security vulnerabilities around these technologies. With so much of the business world reliant on technology, we need to ensure that there are enough trained professionals to properly manage and protect all the information made available through it. As it currently stands there are not enough IT security professionals that are properly trained to deal with such things as a cyber-attack, data leak and even an internal security audit. ISACA provided a survey in January that stated 86 percent of global organization leadership believes there are not enough skilled expects in the field to hire.[1]

Read More

Smartphone Security Awareness Key to Preventing Handheld Hacking

Smartphones are everywhere, and the number is growing by leaps and bound. More than a quarter of the total population in 2016 has a smartphone. The growth in popularity is often attributed to its functionality both as a cell phone as well as a computer. It’s not an exaggeration to call smartphones a handheld computer. All the functions of a computer can be performed on a smartphone these days.

Cyber security concerns for the smartphone users must be a primary issue since users store all their personal data personal data on their phones. You credit card number, the private pic that you took with your SO, and even you company’s sensitive data might be present on your phones. One intrusion from a hacker and your entire life can turn upside down. So, what’s the solution? Keep reading to find out:

Read More

Lack of Visibility = Lack of Protection

Visibility is everything as a security professional. You have to know what you are protecting before you can protect it. Going on a hunch and implementing security piece by piece as the issues arise is a sure way to find yourself in a bad situation. You could be working on something that you feel is high priority, without knowing that there are other pressing issues to handle. The following steps should be taken as soon as possible to ensure that you can cover the most ground as a security team.

Read More

Revolutionizing Enterprise Security with the Internet of Things

The Internet of Things (IoT) has been a major buzzword afloat in the field of business and technology. The internet has been the most phenomenal to have happened in these fields. It has helped the enterprises in connecting multiple devices to a platform and getting the desired results using syncing of such devices. Now, enterprises are trying to take it further. They wish to connect common household items to the internet! Such a step creates chills every time it is heard by the masses, but it stands true.

However, every technological innovation comes with its own downsides. The Internet of Things is sure to make things complex with everything connected to the internet. It is expected that about 20 billion things connected to the internet by 2020. It poses a serious question as to the security of these things connected online. If you’re an enterprise and worried about the security of the IoT, then you’re at the right place. This article will guide you in enhancing your security to deal with the upcoming threats. Let’s proceed:

Read More

Subscribe to Email Updates

About iSheriff

iSheriff is the leading provider of content and endpoint security from the cloud. We keep organizations and individuals safe from cybercrime, malware and digital threats. Thousands of businesses across a wide array of industries have deployed our solutions, including some of the most sophisticated buyers of security technology worldwide.