2014 MSR

August 28, 2014

SECURITY

You’re Only as Secure as Your Weakest Link: Operationalizing Security

2 min read

I am reminded of the wisdom of the old saw that “no news is good news” as almost every day brings us headline after headline highlighting that yet another company has experienced a systems breach and valuable data has been compromised. Companies continue to increase the amount of money spent on cyber security in an […]

August 27, 2014

SECURITY

Social Engineering:
 Finding the Weak Links In-Person

2 min read

An enterprise can pay hundreds of thousands of dollars or more for the latest security software and imagine itself protected from targeted attacks that come in via the network. But if the threat is a real-live person who walks in the front door of an office or server farm, what good can the network edge […]

August 26, 2014

SECURITY

The increasing prevalence and complexity of malware

2 min read

In recent months, many organizations are becoming more interested in the information security landscape and how these threats can affect their business today. In the recent Cisco 2014 Midyear Security Report, the results showed that 90% of select customer networks were found issuing DNS queries to domain names known to be associated with malware distribution. […]