Home > Support > Blog
Steps You Should Take to Secure Your Mobile Device

Steps You Should Take to Secure Your Mobile Device

Cybercriminals are constantly looking for ways to exploit our mobile devices. Mobile users should protect their devices to defend against threats. Following are some steps that can be taken to protect your mobile devices:

Monday, January 22, 2018/Author: Todd Rothman, Cybersecurity Operations Manager /Number of views (46)/Comments (0)/
Categories: Security Services
Tags:
Meltdown, Spectre Flaws Require Vigilance, Not Panic

Meltdown, Spectre Flaws Require Vigilance, Not Panic

“Keep Calm and Carry On.” Originally used in World War II-era motivational posters from the British government before becoming an Internet meme, this catchphrase is actually very good advice for those feeling uneasy about the recent revelations of significant security flaws in central processing units (CPUs).

Thursday, January 11, 2018/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (96)/Comments (0)/
Categories: Security Services
Tags:
Digital Forensics Plays an Important Role in Security Incident Response

Digital Forensics Plays an Important Role in Security Incident Response

Fans of TV shows such as “CSI: Miami” are familiar with the forensic tools and procedures used to investigate crimes. Digital forensics employs similar techniques to gather evidence involving information technology.

Thursday, January 04, 2018/Author: Jill Belli, SIEM Engineeer/Number of views (175)/Comments (0)/
Categories: Security Services
Remote Code Execution Vulnerabilities Dominate the Security Headlines

Remote Code Execution Vulnerabilities Dominate the Security Headlines

On Nov. 8, Microsoft published a security advisory about a remote code execution vulnerability in Microsoft Office documents with Dynamic Data Exchange (DDE) fields. The advisory was related to three separate phishing campaigns containing attachments that used the DDE protocol to download and execute malicious code.

Wednesday, December 06, 2017/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (135)/Comments (0)/
Categories: Security Services
How Video Surveillance Can Help Secure Oil and Gas Operations

How Video Surveillance Can Help Secure Oil and Gas Operations

In October 2016, climate change activists broke into flow stations in four states and turned off valves on five cross-border pipelines that move crude oil from Canada to the U.S. In April 2017, contractors inspecting the Dakota Access Pipeline found a burnt hole the size of a dime, the result of vandalism.

Monday, November 20, 2017/Author: Larry Jones, VP Energy & Industrial Sales/Number of views (186)/Comments (0)/
Categories: Security Services
RSS
12345678910 Last