InfoSight Provides Network Protection Against TDLv4 Rootkit Malware

What is this? A new "TDLv4" version of the TDSS rootkit, which was first discovered in 2008, has infected over 4.5 million machines world-wide as of April 2011. Infected machines are joined to a botnet which can be used for malicious purposes such as mounting network/endpoint attacks, allowing installation of more malware on the infected systems, distributing "spam" emails, and exfiltrating user data. The Dirty Details... TDLv4 uses a number of sophisticated components including rootkit [...]

By | July 18th, 2011
IT Infrastructure, Network Security & Solutions|Comments Off on InfoSight Provides Network Protection Against TDLv4 Rootkit Malware

InfoSight Made It to the Major Leagues!

Personalize funny videos and birthday eCards at JibJab!

By | July 8th, 2011
IT Infrastructure, Network Security & Solutions|Comments Off on InfoSight Made It to the Major Leagues!

Do you know which threats your Anti-Virus won’t stop?

News headlines have been a constant reminder every day that data leakage and malware attacks are on the rise, and increasing at high speeds.  Many believe these malicious attacks are targeted towards large corporations with big bucks, but businesses of all size and functions are facing these risks every day.  Your basic anti-virus solution alone won’t stop these attacks; you need to take extra provisions when protecting your organization. To help you mitigate the risks, [...]

By | April 21st, 2011
Industry InSights, IT Infrastructure|Comments Off on Do you know which threats your Anti-Virus won’t stop?

IDS & IPS for Dummies: What’s the Difference & Why Do I Need Them?

Twitter |  Facebook |  LinkedIn Privacy is a concern for most of us, regardless of our occupation. Protecting your computer network against attack is vital, especially in the highly connected network environment that we live in. To ensure system privacy, many organizations rely upon Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS); but what are the differences between the two and why are they needed? Think of it this way: Intrusion Detection is passive, [...]

By | March 23rd, 2011
IT Infrastructure|Comments Off on IDS & IPS for Dummies: What’s the Difference & Why Do I Need Them?

What Are the Odds of a Security Breach at Your Institution?

If your home has ever been burglarized, you know the unnerving feeling of being violated and how the experience can haunt you for a long time. Obviously, locks and bolts are only as strong as the door and the frame they’re fitted to. This is also true of the security posture of financial institutions. Outdated software applications, misconfigured devices, and ineffective security policies are much like the weak or rotten woodwork framing the door of your home ...

By | March 31st, 2009
Network Security & Solutions|Comments Off on What Are the Odds of a Security Breach at Your Institution?

How Does Your Security Strategy Rate?

Much to the chagrin of IT professionals who face the constant onslaught of threats and problems, security tests can never prove that you are secure. That’s because security is a process, not a final destination. As such, security testing should be applied with a well thought-out strategy...

By | March 31st, 2009
Compliance & Business Continuity, Network Security & Solutions|Comments Off on How Does Your Security Strategy Rate?