Blog

Are Multi-function Devices a Security Risk in Your Workplace?

No doubt your employees enjoy the benefits of networked multi-function printers (MFPs). But has your organization considered how big a threat these devices could pose to your information security? Here’s a hint: It could be more of a risk than an employee’s laptop.

Continue Reading

Best Practices for Improving MSP Client Security

Owners of small and mid-sized businesses increasingly turn to managed service providers (MSPs) to protect their systems, and their customers, from data breaches. What should MSPs who want to seize this opportunity be doing?

Continue Reading

Employee Error and Security: How to Contain the X-Factor

Employee error is the Achilles heel of even the best-laid plans to safeguard an organization’s data. It takes a hundred different forms, and all of them can be taken advantage of by hackers. What’s an IT or security professional to do?

Continue Reading

Kaspersky and FireEye Zero-Day Vulnerabilities

Who Is Watching the Watchers?

In one weekend, two prominent security software products are shown to contain zero-day flaws that may be exploitable by hackers. We look at why the conventional “security stack” is not enough.

Continue Reading

Charlie Miller on the Fiat Chrysler Hack

Remember the experiment where a team was able to hack into a vehicle and take over its controls? Learn how this was possible – from the hacker himself.

Continue Reading

USB Security: How Do I Protect My Organization from Threats?

It’s an important question every IT organization must ask: Should I allow employees to use USB personal devices? We explore the reasons why USB devices are a top threat, starting with the difficulty in managing them, and why patches and usage rules are not enough.

Continue Reading

How Ukrainian Hackers (Temporarily) Beat Wall Street

A recent combination of hacking and insider trading gave some traders an unfair advantage. In this case, their persistence paid off, but learn what you can do to gain the upper hand.

Continue Reading

Could a Summer Intern Be a Security Threat?

Observable Networks examines the recent arrest of a FireEye intern who was distributing malware. Could interns also be a threat to your network security?

Continue Reading

How the OPM Data Breach Could Have Been Avoided

The recent Office of Personnel Management data breach is much larger than first expected. Was this hack preventable?

Continue Reading

Three Much-too-Easy Ways Hackers Infiltrate Your Network

As IT professionals we are aware of many of the tactics used by hackers. But are your employees? Here are three easy methods still commonly used to infiltrate networks.

Continue Reading