Posted: Friday, May 21, 2021

The Evolution of Cyber Security Volume 4: The True Cost of a Data Breach

The Evolution of Cyber Security Volume 4: The True Cost of a Data Breach

The knock-on effect of a data breach can be devastating for a company. When customers start taking their business—and their money—elsewhere, that can be a real body blow.” – Christopher Graham

In January 2021, we witnessed the largest ransomware demand in history: the $50 million ransom demand from Acer by REvil gang. Although the actual amount paid will be considerably less then the original demand it is still extremely lucrative for cybercrimals.

Read more »

Number of views (217)

Posted: Friday, April 16, 2021

The Evolution of Cyber Security Volume 3: Understanding the Importance of MFA

The Evolution of Cyber Security Volume 3: Understanding the Importance of MFA

One of the biggest problems with traditional user ID and password login is the need to maintain a password database. Whether encrypted or not, if the database is captured it provides an attacker with a source to verify their guesses at speeds limited only by their hardware resources. Given enough time, a captured password database will fall.

As processing speeds of CPUs increase, brute force attacks have become a real threat. GPGPU cracking can produce more than 500,000,000 passwords per second even on lower end gaming hardware. Depending on the software, it can take as little as 160 seconds to crack a 14-character alphanumeric password. A password database alone does not stand a chance against such methods when it is a real target of interest.

Read more »

Number of views (285)

Posted: Tuesday, February 23, 2021

The Evolution of Cyber Security Volume 1: The Emergence of XDR

The Evolution of Cyber Security Volume 1: The Emergence of XDR

“If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using every technology tool at their disposal to hack into people’s accounts. If they know there’s a key hidden somewhere, they won’t stop until they find it.” Tim Cook

In the game of cat and mouse between data security and bad actors, extended detection and response (XDR) is the latest weapon that organizations can utilize to strengthen their security posture.

XDR is a new approach to threat detection and response, a key element in defending an organization’s infrastructure and data from damage or unauthorized access and misuse. 

Read more »

Number of views (588)

Posted: Monday, August 27, 2018

Securing Your Data: Your Guide to Improving Your Data Protection

Securing Your Data: Your Guide to Improving Your Data Protection

By : Paul Oh

The talk of data protection, data breaches, and cyber security won't be going away anytime soon. As a rising threat all over the world, it's become more important than ever before to gain a deeper understanding of these trends and the short and long-term effects they could have on your business. 

Read more »

Number of views (18434)

Posted: Tuesday, September 29, 2015

Are the critical IT functions of your business disaster proof?

Are the critical IT functions of your business disaster proof?

Data loss and natural disasters have increased the importance of having a well planned and effective IT disaster strategy for your business. New capabilities provide companies of all sizes the potential for a less costly, faster and more flexible recovery solution for backing up data.

Read more »

Number of views (30647)

Posted: Friday, October 31, 2014

How to solve your biggest security issues with encryption.

How to solve your biggest security issues with encryption.


Securing sensitive data is one of the greatest challenges faced by many organizations of all sizes. Increasing regulatory demands and the constantly changing threat landscape have brought data security to the forefront of IT issues. Several of the more important data security threats are related to the protection of the storage environment, where drive loss and theft are primary risk factors.

Read more »

Number of views (17221)

CategoryID: