For those of you who were around in the late 90s, the Managed Service Provider (MSP) concept was in its infancy. While the concept was simple–create and act as a centralized IT environment and offer it to multiple companies to leverage on a consumption basis–trusting the model, and therefore adoption, took time. Fast forward to today, and MSPs have become second nature. MSPs are in a unique situation, able… Read More
How to operate in a growing distributed environment
The holidays are upon us, and while it’s prime time for shopping… it’s also prime time for cyber adversaries. The target-rich environment of email offers, social selling and digital payments provides perfect cover for bad guys. 93% of attacks continue to originate through email… even with all the tools and training available. And it only takes one click to create a ransomware situation. It’s easy to think of this as… Read More
Microsegmentation: Defense against unseen mines in your network
I proudly served in the US Navy for the better part of 14 years. The first ship I served on was the USS Missouri (BB-63) as a Hospital Corpsman. During my time aboard, we deployed to the Persian Gulf as part of the battle contingent for Operation Desert Storm. Whenever a ship enters a potentially dangerous situation, the Captain orders, “General Quarters, set condition Zebra.” Condition Zebra means that every doorway on… Read More
“Is anybody out there??? ….”
Tech and security vendors galore hype AI… their “holy grail” message focusing on the transformational benefits of automation. Well, yes and no. In my experience at DataEndure, when Murphy’s law strikes–and it will–in the form of a data breach, ransomware, or outage… our clients aren’t reassured because they have automation in place–they are relieved because they have PEOPLE they know and trust responding with the level of urgency their situation… Read More
Network Resiliency vs. Network Security – What’s the Big Deal?
There is a risk of becoming so focused on security controls and tools, businesses can neglect a key area of vulnerability and risk – the network. Conventional enterprise network architectures have not been designed and built for the dynamic and diverse deployment scenarios we face today. While network resilience has been the focus for most tech leaders; the distributed nature of our workforce makes “edgeless” networks an attractive and lucrative… Read More
Considerations of the Modern Network
The past two years have seen radical changes in the way we use the network. Seemingly, in the blink of an eye, we have gone from an in-office, centralized and controlled network to a fully or near-fully distributed model. The pandemic revealed the practicality, problems, and needs of a remote workforce. We also learned that the workforce largely prefers the remote model over the in-office models of the past. As… Read More
Don’t Be the Next Victim: 3 Critical Layers for Protecting Against Polymorphic Malware
As if cyber-defense wasn’t difficult enough – try battling malware that constantly changes its identifiable features in order to evade detection. Polymorphic malware isn’t new; the first polymorphic virus dates back to 1989. But fast-changing polymorphic malware now makes up 97% of the malware organizations face – updating itself with new definitions every few days, mutating faster than traditional security systems can keep up and making previous detection signatures obsolete. There are… Read More
Announcing eSCV: DataEndure SOC/MDR Service Enhancement
Based on the continuously increasing and evolving threat landscape, we are excited to announce a significant enhancement to DataEndure’s SOC & MDR offerings with the addition of eXtended Security Controls Validation & Vulnerability Scanning (eSCV). With cloud expansion at an all-time high, eSCV will afford customers the same peace of mind about the security of their external and cloud assets as they have with our internal Security Controls Validation, included… Read More
Cyber Resilience Isn’t Enough: The Three Layers of Infrastructure Resilience
Resilience is a hot topic these days, and for good reason. With our hyper-dependency on data and access, there is a very low tolerance for error or disruption, and the distributed nature of our workforce makes “edgeless” networks an attractive and lucrative target for adversaries. Cyber Resilience includes elements like endpoint protection, firewalling, advanced phishing, email protection and DNS defense – all working together to ensure a fortified security posture. Yet… Read More
Top 3 Security Priorities for 2022
Over the course of any given year, we will have thousands of conversations with IT leaders about infrastructure and cyber-resilience. As we enter 2022, there were 3 Top Priorities organizations seemed to be talking about that we thought were important enough to share. In fact, we discussed this same topic in our December 2021 TECH talk which you can watch here. With our unique position as a solution integrator and… Read More
- « Previous Page
- 1
- …
- 3
- 4
- 5
- 6
- 7
- …
- 9
- Next Page »