The top 5 security issues from the “Internet of Things”

The internet of things or the internet of insecure things is a rapidly growing monster that seems to have taken over the industry. The IoT is a Security professional’s worse nightmare. Consisting of quickly made technology that is web based, where security is just an afterthought. Below are the top five reasons any security professional should cringe in regards to the internet of things.

Read More

How to Outsmart Hackers and Malware

It seems every time we turn around there’s a new story about a data breach or a new strain of malware to content with. It’s hard to keep track of them all- and it’s even harder to keep your organization safe from these threats that keep popping up. So how can you outsmart hackers and viruses? We have a couple things for you to consider in order to effectively strategize against the criminals who want to steal your data.

Read More

Understanding ALL of Ransomware’s costs

It is not a rumor that Ransomware is making a popular comeback in the hacking industry. Having that pop up come across your screen saying that all your data is encrypted and to pay up if you want it back can be a haunting experience for any IT professional. But recent surveys show that most companies have far more expensive losses that come from ransomware than actually paying the ransom fee. Some companies even suggested it was easier to pay the fee and have the cybercriminal unlock their data.

Read More

Security Breaches by Employees are on the Rise

Protecting company data from the hands of data snoopers out there on the internet is the agenda of all business owners. Most businesses, big or small, hold frequent meetings to address this issue, where employees of different levels are involved in a discussion about and review their data protection techniques and where they stand. A lot of focus has been put on this topic through news articles and blog posts on the internet due to many high profile data breaches taking place.

Read More

Is BYOD Infecting Your Company?

Many organizations have implemented a Bring Your Own Device policy within their companies. With so many people using mobile devices to access email, company documents, websites, and business applications, it makes sense to allow users to leverage these devices to be more productive. But is this safe?

Read More

Is Adobe Flash still a vulnerability?

Adobe Flash has been popular since it was first released 20 years ago. The freeware software was used for a multitude of purposes, including playing games or streaming audio or video files on the internet. This has been the case for almost two decades now, with flash player being used to execute rich internet applications and viewing multimedia on the Adobe Flash platform.

Read More

Cyber Security: The War on Credit Unions

As Credit Unions of every size – national, regional, and community based – increase the collection of customers’ personal and financial information, they become serious targets of cyber crime. As such these unions are encouraged to understand that they are in a cyber security battle and must keep fighting the vice on all fronts.

Read More

Next Gen firewall- overpromised and under delivered

The NGFW (Next Generation Firewall) was supposed to be a one stop shop solution for all your threat prevention needs. Little did everyone know that this technology hasn’t quite crossed the beneficially boundaries for most companies in the technology world. In order for a NGFW to work properly it needs to be an integrated part of your network security.

Read More

10 Reasons Hackers Target Credit Unions

Credit unions are often forgotten in the conversations around protecting financial institutions and implementing financial cyber security. As early as 2006, it was found that credit unions are even more frequently targeted than banks. Hackers target credit unions for a simple reason: they are easier to hack. There are 10 reasons why:

Read More

Cyber insurance; what does it cover?

As a security professional, you are taught what to do in case of a data breach. You know who to contact, steps to take to control the situation and ways to prevent it from happening again. But who is exactly going to cover all of these extra cost and what do these cost entail? CLIC (Cyber Liability Insurance Cover) is your answer to anything that is associated with cybercrime incidents. CLIC has been around for roughly 10 years as a sole insurance plan that companies can purchase. There are many costs involved with a data breach, and depending on the size of your company CLIC might be a valuable option for you to not only cover the upfront cost but to get back up and running in a timely bases.

Read More

Why Financial Cyber Security is Necessary for All Companies

Technological advancement has resulted in the storage of data and other financial information in the cloud service. Though these services enhance the operation and management of businesses, cybercrime threatens many companies regardless of their size. To avert huge losses, financial cyber security is essential for all businesses. Thus, there is a need for complex security strategies and practices to prevent cyber criminals from accessing financial information stored mostly in the cloud services.

Read More

Using Sandboxes? Beware of False Positives

Sandboxing can be a valuable resource to any security team that puts the time and resources into it. If not, returning a bunch of false positives could just be a waste of your company’s resources. Below are some common steps that should be taken to ensure your sandbox is working properly for your company.

Read More

Finance and Cyber Security: What You Need to Know

There has been an increased threat of cyber-attacks, and cybersecurity experts expect these trend to continue in the future. The financial system is a vital component of any country, and this remains a prime target. It can be a costly affair when any financial cyber security is compromised and can utterly compromise the confidence people have in the financial service. It is, therefore, important to maintain the financial cyber security of any institution and to do these there are four most important principles that need to be upheld.

Read More

5 Quick Steps to Take to Evaluate Your Security

Cyber security is something all businesses pay great attention to. This is well understood, for the past year it saw around 781 data breaches that compromised close to 170 million private records, according to Identity Theft Resource Centre. This staggering statistic goes to show that no one is safe in today’s world from data breaches and other security threats as well.

Awareness about security threats has been spread through many blog pieces and news articles, and business owners have not failed to notice them either. But what matters is not being informed about something but being prepared for it. Therefore, we provide you 5 simple steps you can take to evaluate your security and try to protect yourself from the many security risks in today’s world.

Read More

How HIPAA Compliance Affects Your Company

HIPAA compliance rules require that providers protect information that they keep or send out electronically. If the transmission of information is under contract to others, the same rules apply to them. Others handling information are “covered entities” and this includes health care providers, health plans, health care clearinghouses and business associates. A covered entity could be a doctor, clinic staff, psychologist, dentist, chiropractor, nursing home staff or a pharmacy. If any of these entities transmit healthcare information electronically, they must abide by HIPAA Compliance Rules. Beyond that, a business associate who contracts to send or receive information must have a business associate contract that spells out the HIPAA Compliance Rules that apply to them.

Read More

Transient Security; How do you Secure Guests and Deal with Network Separation

Having your network locked down to a need to know bases creates a good feeling for security professionals, but one day someone in your company hosts a meeting with an outside vendor. This outside vendor needs access to the internet during the meeting. An instant feeling of panic rushes over you because you didn’t plan for this situation. How do you provide internet service for guests at your company, without compromising your networks treasures? The following are several different options to look into before making a decision. Some of these will apply to smaller companies, but it is better to hear all the options before going forward.

Read More

Subscribe to Email Updates

About iSheriff

iSheriff is the leading provider of content and endpoint security from the cloud. We keep organizations and individuals safe from cybercrime, malware and digital threats. Thousands of businesses across a wide array of industries have deployed our solutions, including some of the most sophisticated buyers of security technology worldwide.