Blog

19
Oct

You Should Have Always Been Careful Using WiFi It’s always been risky to use public WiFi with your sensitive business data.  As one writer has noted, using public WiFi is like having unprotected sex.  WiFi networks are vulnerable to attacks. There have been different encryption standards adopted to help secure WiFi.    WEP (Wired Equivalent […]

6
Oct

According to a recent global survey of C-suite executives and IT decision makers, most executives still don’t fully comprehend the nature of the cyberthreats they face or the potential consequences of an attack. Without the proper defenses in place, you’re putting nearly every element of your organization at risk. A cyberattack can cripple your operations, ruin customer […]

22
Sep

The news reports indicate that the massive Equifax breach was the result of a failure to patch a vulnerability in Apache Struts.  The vulnerability was publicly disclosed on March 10 and was exploited at Equifax between May and late July. During that window, Equifax did not patch this know vulnerability.  Software patching is a part […]

22
Aug

FAR 52.204-21 and Federal Cybersecurity Standards  In 2016 the Department of Defense, NASA and the GSA published FAR contract clause 52.204-21 that provided minimum standards for cybersecurity for all contractors dealing with the federal government.  The regulation applies to all ‘covered contractor information systems’ that process, store or transmit ‘Federal contract information.’ This clause will […]

3
Aug

Dell Boomi, an integration-platform-as-a-service company with offices in Austin, recently released its new cloud-based enterprise integration platform. Amid touting its flexibility to manage data across hybrid IT architectures, the new release focuses on one relevant issue: improvements in data security. As the cloud becomes more widely adopted, discussion around its security has mushroomed. When RightScale conducted its […]

31
Jul

Small business owners who don’t consider tech their strongest suit, cloud computing might be unfamiliar at best and daunting at worst. Many realize moving computer resources and data from an in-house arrangement to a shared on-demand environment makes sense in many ways, but the different X-as-a-service terms related to the cloud can be confusing. But […]