The Need for Securing Privileged Accounts

The Need for Securing Privileged Accounts

Most common breaches begin with the hacker gaining access to a privileged account, so securing these accounts is critical. In March, the United States Federal Bureau of Investigation (FBI) notified Citrix Systems that it was likely being targeted by an Iranian-linked...
Low Budgets Plague SMB IT Security Stance

Low Budgets Plague SMB IT Security Stance

Back in 2013, a Faronics/Ponemon study found that lack of budget and poor security capability skills were the primary causes behind the generally poor state of cybersecurity in small and medium-sized businesses (SMBs). Dmitry Shesterin, Faronics’ VP of product...
Don’t Wait for Something BAD to Happen

Don’t Wait for Something BAD to Happen

Proactive, preventative measures are the best defense against security threats. Businesses simply cannot afford to wait for an incident to happen and then react after the fact. Not only can it damage reputations and customer relationships, but it can also put you out...
The Roach that is Ransomware

The Roach that is Ransomware

Summer is approaching and with it comes the creepy crawly roaches. You do everything you can to keep them out of your home but they always seem to find a way in. Once inside your home it just seems like you can never get rid of  them. The same can be said for...