Social Media: Why IT Pros should use it

Twitter |  Facebook |  LinkedIn Social Media: Why IT Pros should use it You’ve probably said it yourself, “Social media is all about people who want to talk about themselves.” Although Social Media sites can be a way for some people to deliver trivial information, it can also be an incredibly valuable professional tool. For those IT pros who still aren’t sold on the benefits of Social Media sites, here are a few reasons why [...]

By | March 28th, 2011
IT Infrastructure|Comments Off on Social Media: Why IT Pros should use it

In The News: New Banking Trojan

Twitter |  Facebook |  LinkedIn In The News: New Banking Trojan The SonicWALL UTM Research team has received reports of a new banking Trojan named Tatanga in the wild. Spain, Germany, the United States, and the United Kingdom are the top countries affected by this Trojan. This Trojan has many sophisticated features resembling functions found in the popular crime-ware toolkits Zeus and SpyEye which includes: Encrypted configuration files Encrypted communication between the bot and the [...]

By | March 27th, 2011
IT Infrastructure|Comments Off on In The News: New Banking Trojan

6 Sure-Fire Ways to Increase Mobile Security

6 Sure-fire Ways to Increase Mobile Security Mobile threats have risen by more than eight times over the past five years, with a sharp increase in 2010. After some 200,000 users downloaded infected mobile apps from the official app store Android Market, Google pulled more than 50 infected programs from the Market. In an effort to protect information on mobile devices, IT managers are increasingly becoming aware of the need to not only apply security [...]

By | March 26th, 2011
IT Infrastructure, Network Security & Solutions|Comments Off on 6 Sure-Fire Ways to Increase Mobile Security

Top Tech Threats & Trends for 2011

Twitter |  Facebook |  LinkedIn Top Tech Threats & Trends for 2011 Here at InfoSight, Inc. we have put together our take on what the key tech trends and threats of 2011 will be. We know as the technologies become faster and smarter so will the threats that follow them. The Social Engineering and Black Hat SEO we experienced in the previous year will still hold strong and continue to transform, and we’ll see a [...]

By | March 26th, 2011
IT Infrastructure|Comments Off on Top Tech Threats & Trends for 2011

A Sneak Peak at the FFIEC’s New Online Authentication Guidance

Twitter |  Facebook |  LinkedIn A sneak peak at the FFIEC’s new online authentication guidance What will the FFIEC’s new online authentication guidance look like? In short, it makes financial institutions more responsible for fraud prevention and the security they provide. Although it has not yet unveiled its update to 2005’s authentication guidance, the FFIEC has recently distributed a draft document to its member agencies which singles out five keys areas of improvement: 1.       Improved [...]

By | March 25th, 2011
IT Infrastructure|Comments Off on A Sneak Peak at the FFIEC’s New Online Authentication Guidance

InfoSight Inc Launches New Website, www.InfoSightInc.com

Twitter |  Facebook |  LinkedIn Our new website provides rich content, improved navigation, a new training portal and direct access to reference materials and our social media sites. We recently launched our new-and-improved website. Check it out! Here's what you can expect: rich and informative content improved navigation and sitemap a Knowledge Center that includes a schedule of educational webinars and reference materials a soon-to-be-unveiled IT security and compliance training portal as part of our new Knowledge Center one-click access [...]

By | March 24th, 2011
IT Infrastructure|Comments Off on InfoSight Inc Launches New Website, www.InfoSightInc.com

IDS & IPS for Dummies: What’s the Difference & Why Do I Need Them?

Twitter |  Facebook |  LinkedIn Privacy is a concern for most of us, regardless of our occupation. Protecting your computer network against attack is vital, especially in the highly connected network environment that we live in. To ensure system privacy, many organizations rely upon Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS); but what are the differences between the two and why are they needed? Think of it this way: Intrusion Detection is passive, [...]

By | March 23rd, 2011
IT Infrastructure|Comments Off on IDS & IPS for Dummies: What’s the Difference & Why Do I Need Them?

Managed Firewall 101: What Everyone Needs to Know

If your home has ever been burglarized, you know what it feels like to be victimized. You may have been temporarily aggravated or even angered by the “inconveniences” that followed the event, i.e., repairing a broken window or door, changing the locks, installing an alarm system, replacing items that were stolen, wondering what else was stolen that you haven’t noticed yet, etc., and somehow, the feeling of just how vulnerable you are stayed with you [...]

By | March 22nd, 2011
IT Infrastructure|Comments Off on Managed Firewall 101: What Everyone Needs to Know

Data Loss Prevention: Should You Trust Your Employees?

Stolen identities, bank accounts and credit card numbers are sold in bulk every day in shadowy online forums, often for pennies on the dollar. Cyber criminals can easily make a few hundred to a few thousand bucks a day from selling this stuff. Data can be breached in many ways including intercepting it as it travels across the network, stealing data that is stored in file shares, databases and endpoints, and spying on data that’s [...]

By | March 22nd, 2011
IT Infrastructure, Network Security & Solutions|Comments Off on Data Loss Prevention: Should You Trust Your Employees?

10 Tips to Help You Decide Which Email Archive Solution Is Best For Your Organization

Choosing whether or not to archive is a no-brainer—archiving is a must for most organizations. Determining whether or not to implement an in-house archiving system or outsource the task to a SaaS provider is a bit more complicated. There are a variety of factors to consider before making a choice, as every organization has different goals to meet and resources available to them. Before you make a decision about whether to implement an in-house email [...]

By | March 22nd, 2011
Email & Hosted Solutions, IT Infrastructure|Comments Off on 10 Tips to Help You Decide Which Email Archive Solution Is Best For Your Organization