<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=176059862897267&amp;ev=PageView&amp;noscript=1">

Most Recent

How to Assess and Manage Cyber Risk for Your Enterprise

Posted by Security Tech Alliance on Aug 22, 2017 8:07:00 AM | Topics: Risk Management, Data Protection, Network Security

In the wake of a phishing scam that victimized internet giants Facebook and Google to the tune of $100 million, it’s clear that CEOs at every level should take steps to protect their organizations from cyber risks. From 2013 to 2015, the companies were fooled into wiring money to a Lithuanian hacker, believing he was a legitimate electronics manufacturer.

Read More

How to Make Multifactor Authentication Easier on Your IT Team

Posted by Security Tech Alliance on Jun 13, 2017 8:09:00 AM | Topics: Data Protection, Access Management

The importance of implementing two-factor authentication (2FA) and multifactor authentication is no longer in doubt. Previously, we discussed best practices for implementing multifactor implementation. However, one area that hasn’t garnered as much attention is how multifactor authentication can weigh down your IT staff, particularly if your staff is made up of only a handful of employees.

Read More

How to Secure the Blind Spots in Your Network

Posted by Security Tech Alliance on May 30, 2017 8:30:00 AM | Topics: Malware, Firewall, Data Protection, Access Management

In a previous blog, we explored the common blind spots in company networks. As networks increase in complexity, cyberattacks become more difficult to detect and prevent. Virtualized infrastructure and mobile endpoints make workplaces more efficient and flexible, but they also reduce network visibility and create opportunities for hackers to infiltrate your system. While encrypting your traffic protects your sensitive data from prying eyes, it can also prevent your security tools from seeing anomalous patterns that signal a breach.

Read More

3 Ways to Protect Your Network From Insecure Edge Devices

Posted by Security Tech Alliance on May 23, 2017 8:05:00 AM | Topics: Firewall, Data Protection, Access Management

Edge devices are crucial entry points to your network. Routers and modems enable users to connect with your system and allow your company’s computers to communicate with each other. Unfortunately, these entry points are like chinks in your armor that allow cybercriminals to gain access.

Read More

Protecting Your Network From the Vulnerabilities of Open-Source IoT

Posted by Security Tech Alliance on May 18, 2017 10:03:00 AM | Topics: Malware, Risk Management, Data Protection, IoT

There is a perfect storm brewing in the internet ecosphere. IoT’s dramatic growth, combined with increased dependence on sensors to drive big data analytics and the proliferation of botnets that can seize control of IoT devices, has caused a whirlwind of trouble in the IT world.

Read More

Unpatched Security Flaws Expose Linksys Routers

Posted by Security Tech Alliance on May 16, 2017 7:45:00 AM | Topics: Risk Management, Data Protection, Access Management

In October 2016, Dyn, a domain name system (DNS) provider for many high-profile websites, experienced a 2-wave distributed denial of service attack (DDoS) that denied user access to their customers’ websites. The Mirai botnet used 10s of millions of IP addresses to create so much traffic that it crippled Dyn’s network.

Read More

Is Your Port 3389 Safe From Samas? | Ransomware

Posted by Security Tech Alliance on May 9, 2017 8:00:00 AM | Topics: Malware, Firewall, Risk Management, Data Protection

In our last blog, we profiled a recent ransomware attack that exploited a new attack vector. Instead of reeling in a victim with an infected phishing email, the hacker used an exposed remote desktop protocol (RDP) port to gain entry to the victim’s system.

Read More

7 Tips to Improve Your Email Security | Security Tips

Posted by Security Tech Alliance on Apr 27, 2017 10:06:00 AM | Topics: Data Protection

The rise of social media has changed the way businesses work. Direct interaction with customers, often in real-time, is bringing companies and their consumers closer. But even as new opportunities for dialog open, one form of exchange stands the test of time. Since its inception in the 1960s, email has become a primary medium for business communication.

Read More

3 Network Blind Spots Hackers Love to Target | Network Security

Most organizations’ networks are getting bigger and more complex, with vast numbers of endpoints spread out across larger geographical areas. The scale and complexity of today’s networks create blind spots for hackers to target.

Read More

Financial Hackers: Well-Funded, Professional, and Collaborative | Security

Posted by Security Tech Alliance on Feb 2, 2017 9:30:00 AM | Topics: Data Protection

In August 2016, Kaspersky Lab revealed that malware attacks on the financial sector rose 16% in the second quarter of 2016. The increase was attributed, in part, to the combined efforts of the authors of the Nymaim and Gozi banking Trojans. 

Read More

Blog Search


Get this eBook covering three prominent threats faced by six critical industries.

Get Your eBook


Stay up-to-date with the latest cyber-security developments and threats facing organizations today. You will receive actionable information to keep your data and applications secure.