Tips for Securing Mobile Devices in the Enterprise
As smartphone and tablet sales continue to increase, more employees are bringing their personal mobile devices into the corporate environment. Allowing these devices to connect to your network enterprise without any guidelines can pose a serious risk. Securing mobile devices is one of the biggest challenges facing IT security professionals as cyber criminals turn their attention to this platform. Research firm IDC says global spending on mobile security is on track to balloon to $1.9 [...]
InfoSight Provides Network Protection Against TDLv4 Rootkit Malware
What is this? A new "TDLv4" version of the TDSS rootkit, which was first discovered in 2008, has infected over 4.5 million machines world-wide as of April 2011. Infected machines are joined to a botnet which can be used for malicious purposes such as mounting network/endpoint attacks, allowing installation of more malware on the infected systems, distributing "spam" emails, and exfiltrating user data. The Dirty Details... TDLv4 uses a number of sophisticated components including rootkit [...]
InfoSight Made It to the Major Leagues!
Personalize funny videos and birthday eCards at JibJab!
Do you know which threats your Anti-Virus won’t stop?
News headlines have been a constant reminder every day that data leakage and malware attacks are on the rise, and increasing at high speeds. Many believe these malicious attacks are targeted towards large corporations with big bucks, but businesses of all size and functions are facing these risks every day. Your basic anti-virus solution alone won’t stop these attacks; you need to take extra provisions when protecting your organization. To help you mitigate the risks, [...]
Managed Firewall 101: What Everyone Needs to Know
If your home has ever been burglarized, you know what it feels like to be victimized. You may have been temporarily aggravated or even angered by the “inconveniences” that followed the event, i.e., repairing a broken window or door, changing the locks, installing an alarm system, replacing items that were stolen, wondering what else was stolen that you haven’t noticed yet, etc., and somehow, the feeling of just how vulnerable you are stayed with you [...]
What Are the Odds of a Security Breach at Your Institution?
If your home has ever been burglarized, you know the unnerving feeling of being violated and how the experience can haunt you for a long time. Obviously, locks and bolts are only as strong as the door and the frame they’re fitted to. This is also true of the security posture of financial institutions. Outdated software applications, misconfigured devices, and ineffective security policies are much like the weak or rotten woodwork framing the door of your home ...
How Does Your Security Strategy Rate?
Much to the chagrin of IT professionals who face the constant onslaught of threats and problems, security tests can never prove that you are secure. That’s because security is a process, not a final destination. As such, security testing should be applied with a well thought-out strategy...
What Are the Top Security Threats for 2009?
Internet-based attacks are becoming increasingly sophisticated and specialized as profit-driven criminals continue to hone their approach to stealing data from businesses, employees and consumers. Security threats are propagating more rapidly, becoming increasingly difficult to detect, and are exploiting technological and human vulnerabilities. Learn about the top security threats for 2009.
Connect With Us