eSecurity Solutions Articles/Blogs

Cyber Security Articles to Keep your Business Secure and Compliant
  • Managed Security Gears Image
    Can Managed Security Solve Company’s Security Challenges? It has never been more obvious when looking at the increasing requirements to provide adequate cyber security that most companies cannot do it with internal staff alone. It
  • Customer Demanding Security Compliance
    Are Your Customers Demanding Compliance Level Security? As scary as this is, more and more of our customers are coming to us telling us that if they can’t prove that they are secure, they will
  • Creating a Zero Trust Security Infrastructure Zero Trust is a security framework that endeavors to make networks more secure by eliminating the concept of trust from an organization’s network architecture. Zero Trust uses a Zero Trust Network Architecture (ZTNA) also
  • Ransomware - Colonial Pipeline
    Ransomware is a symptom of inadequate security Ransomware is definitely a growing problem with ten percent (10%) of all breaches in 2021 involving ransomware according to the 2021 Verizon DBIR.   Ransomware has been prominently
  • Post Pandemic 2021 Cyber Security Trends
      2021 Cyber Security Trends in a Post Pandemic World What Changed in 2020 that is Requiring Companies to Relook at their Security? 2020 forced all companies to focus on survival. The first task was
  • Zero Trust Paradigm
    Zero Trust Security in Software Defined Perimeters In the era of work from home, cloud computing, mobile devices and IoT, the network security perimeter is gradually disintegrating, and internal and external threats are intensifying, leading
  • Email Security, secure email, email attacks, phishing
    Can You Prevent These Email Security Attacks?   Email Attacks are Still the Primary Security Attack Vector 70% of attacks on businesses are from external parties with a financially motivated goal (86% of the time).
  • How do you secure this remote office - Securing Home Offices
    7 Things you Need to Secure Remote Offices   Increased Security Risks with Remote Workers in the “New Normal” The need to have so many employees work from home creates new security risks. These risks
  • Secure Remote workers, Secure work from home employees
    MFA (Multi-factor Auth) Solves the Biggest Work-from-Home Issue – Security   Criminals rely on log-in credential stealing as their #1 method to gain access to your systems, data and applications.    MFA (multi-factor authentication) makes
  • COVID-19 Coronavirus changing Cybersecurity
    2020 Cybersecurity Solutions Needed in a Post-Coronavirus (COVID-19) World Companies in the new post-coronavirus world order must now quickly double down on secure mobile workforce enabling solutions. 2020 security changes are being driven by: 1)
  • Security Blind Spot
    2020 Top 9 Most Ignored Security Controls Security blind spots can cause companies to ignore needed security controls. Blind spots can be caused by not adapting to a changing environment, focusing too much on old
  • Cloud application security - Cloud enabled businesses
    Top 8 Security Risks for Cloud Applications How much money have you spent on cloud application security?  Zero? Almost zero? Everything is moving to the cloud.  Can companies continue to ignore the fact that when
  • 2020 security planning - 2020 cyber security trends
    2020 Cyber Security Planning Guide Cyber Security Trends 2020 2020’s security threats will be driven by new technology and new attack methods that leverage that new technology.  Drivers of new attacks include more servers, applications and
  • Prevent, Detect & Respond ISMS
    Why Prevent, Detect & Respond? The security world is looking beyond security prevention alone to prevent, detect and respond solutions.  No company can prevent all security breaches, so informed companies are implementing strategies that focus
  • Managed Detection and Response Services (MDR)
    Managed Detection & Response – Why you Need it   Detect and Respond is the New Security Focus Managed Detection and Response (MDR) is the latest evolution in managed security services.  It’s goal is to
  • Getting the Security Visibility You Need - SIEM Security Monitoring
    Is a SIEM the Best Way to Monitor All Your Security?   What is in a SIEM We hear all kinds of stories from customers regarding security monitoring. There is a ton of confusion about
  • Managed Security Services, managed security
    3 Big Problems Solved by Managed Security   Managed Security Services Managed security service providers are increasingly providing integrated security solutions that are designed to address an increasing threat landscape. By using new solutions that
  • Public Cloud, Hybrid Cloud, IaaS, Paas Security, Shared Responsibility Model for Security
    10 Steps to Securing Public & Hybrid Clouds   Cloud Security: Are you Ready? Companies are moving toward Cloud Computing The public cloud computing market (mostly Amazon AWS and Microsoft Azure) is growing rapidly at
  • 3rd Party Risk Management - Trust but Verify
      The Need for 3rd Party Risk Management Increasing Most companies are overwhelmed with the task of trying to provide adequate security for their own company. But the requirement for you to secure your company
  • Cyber Security Regulation Changes, Cyber Security Law Changes
    2019 Security Regulation Changes – Fast and Furious In the last year, we have seen a move toward security regulation changes mandating protection of consumer personal data (broadly speaking) extending beyond “private data” to all “personal
  • IOT Security for Office, IOT Security standards
    IoT Security Update: Attacks, Standards & Top IoT Defenses The need for Internet of Things security (IoT security) and IoT security standards has never been higher. IoT threats and attacks are on the rise increasing
  • Future of Cyber Security
    2019 Security Planning Guide Pt 2   The Evolution & Future of Cyber Security In Part 1 of the 2019 planning series, we discussed the evolution of technology and how that has driven cyber attacks. Now
  • Evolution of Cyber security Attack Methods
    2019 Security Planning Guide Pt 1 IT technology has been driving cyber security attack trends and cyber security defenses since the 80s. The attack surface has widened every time a major new technology has been
  • Rise of Software Supply Chain Attacks
    Are Software Supply Chain Attacks Replacing Zero Day? Software supply chain attacks may be replacing zero-day attacks as a method to evade your security. Zero-day attacks are still on the rise, but what if there
  • California Consumer Privacy Act of 2018, CCPA, Personal Data Protection, Personal Private Data
    California Consumer Privacy Act (CCPA) vs. GDPR On June 28, 2018 the most sweeping personal privacy law (AB-375) was passed in California (the California Consumer Privacy Act of 2018) also known as CCPA. A GDPR-like
  • multi function authentication, Two factor authentication, 2fa, mfa
    More than 50% of cyber security breaches involve stolen login credentials, it is the #1 method used. If you asked 100 IT professionals if passwords are enough to keep your company secure probably all of
  • security strategy, security planning
      We are in the midst of a car wreck in terms of security attacks and many companies are treating their wounds with band-aids. Without a cohesive cyber security strategy to address the changing cyber
  • AI cyber security, machine learning cyber security, ai cyber attacks, Attack of the machines
    Can your Security Withstand the AI Attacks of the Machines? It’s coming.  The technology is proven.  The same AI cyber security technology that can be deployed to protect against the latest cyber security attacks is starting
  • GDPR, GDPR Requirements, GDPR Compliance
    EU GDPR Compliance Guide for U.S. Companies Here is quick summary of the EU GDPR as it applies to U.S. companies.  This article defines what it is, who it effects and how to respond to
  • Impact of GDPR, Anonymous Web, GDPR,
    The Impact of GDPR on U.S. Companies   What is the EU GDPR Privacy Regulation? The EU GDPR, is a regulation that lays down rules relating to the protection of EU Personally Identifiable Information (PII)
  • WordPress Security, Website Security
    WordPress Security Checklist for Businesses WordPress now powers 30% of all websites with a 60% share of content management systems, up from 23% in 2015.  Websites are routinely attacked to infect website visitors as well
  • 2018 Cyber Security Trends
    Cyber Criminals are not standing still and 2018 is rolling. What are you doing to move the ball forward in response to 2018 cyber security trends and the resulting threats? 2018 cyber security threats  require an appropriate response on how
  • HTTPS Everywhere, Website Security
    Turning Increased Website Security into Increased Sales Your website is now the most important component of your marketing strategy. But are you leveraging website security to make your website more credible and trustworthy? HTTPS Everywhere
  • Security Information and Event Management (SIEM)
    Can an Affordable SIEM Get You Compliant? SIEMs Need to Be Added to Every Serious Companies Security? Due to increasing cyber security regulations and pressure by business partners, an increasing number of companies need to
  • NIST 800-171 Small Business Compliance
    NIST 800-171 Compliance for Small-Mid Sized Companies The federal government is mandating that their partners all be compliant with NIST 800 which was originally designed for larger federal agencies.  While NIST 800-171 addresses security compliance
  • Next Generation Endpoint Security Needed for Advanced Malware
    Can Antivirus Provide Ransomware & Advanced Malware Protection? Experts now claim that Next Generation Endpoint Protection is required to provide advanced malware protection and that traditional antivirus endpoint security does not work. Advanced malware like Ransomware that
  • CEO Fraud Bank Transaction, Spear Phishing
    CEO Fraud is Killing Companies – 5 Steps to Stopping it CEO Fraud is defined as scam in which cybercriminals spoof company email accounts and impersonate executives using spear phishing to try and fool someone in
  • Office 365 Security
    What Makes you Think Office 365 is Secure? You moved your email and documents to the Office 365 cloud and you assume Office 365 security is actually secure.  Out of sight, out of mind, right? Microsoft wouldn’t
  • SIEM versus Unified Security Monitoring
    Is Your Security Monitoring Delivering Half What you Need? SIEM (Security Information and Event Monitoring) systems are a hot topic in security. More and more companies are being driven to achieve a new higher level
  • Cybersecurity News Summary
    Cybersecurity News Summary – Q2 2017 This is the first installment of a new quarterly cybersecurity news blog on what’s going on in cybersecurity on topics that you might actually care about that can help your
  • Phishing, Social Engineering, Lacking Cyber Security Training Creates a Security Hole
    Ready to Plug Your Biggest Security Blindspot? Social type cyber security attacks were utilized in 43% of breaches in 2016.  That includes, malicious emails, social Website links, and other types of attacks that lure employees
  • WannaCry Ransomware Malware
    Top 10 Ways to Prevent WannaCry Ransomware What is WannaCry? WannaCry is an insanely fast-spreading ransomware malware worm that leverages a Windows exploit to remotely target unpatched or unprotected Windows computers.   Because WannaCry is
  • Cybersecurity Outsourcing to get off Security Treadmill
     Are you making enough progress on your cybersecurity? Customers we talk to want to enhance their cybersecurity, but don’t have the time, resources or money.  They are constantly battling to keep up with latest threats,
  • Cloud Application Security (CASB) Devices
    Are Cloud Applications Silently Stealing Your Data? I hate to get on a soap box, but most businesses are behaving as though the increased use of office cloud applications like O365, Google Docs, Box, CRM,
  • Changing landscape of security
    Not upgrading your security with the latest 2017 security trends can leave you as naked and unprotected as the dinosaurs. Security solutions are moving forward rapidly to protect against the latest threats, and to enable
  • The security threatscape continues to change rapidly and so have the top security threats for 2017. Ransomware has impacted everyone we know. Our employees are proving to be our weakest security link. Data breaches are
  • Cybersecurity Risk Assessment
    Buying a Cybersecurity Risk Assessment Cybersecurity Risk assessments are essential activities performed on your company’s security infrastructure that reveal threats to key corporate assets and vulnerabilities in your current security controls. The ultimate goal of
  • Phishing Attack
    Are Phishing Attacks Stealing Your Money & Data? American companies and individuals paid $325 million in ransomware in 2015 and attacks are on the rise. Ransomware has been detected on 753,684 U.S. computers and is
  • Solving the Risk Assessment Puzzle
    Cybersecurity Risk Assessments – What to Expect Cybersecurity Risk assessments are essential activities performed on your company’s security infrastructure that reveal threats to key corporate assets and vulnerabilities in your current security controls. The ultimate
  • Cyber Security Business Continuity
    Is Business Continuity a Hole in Your Security? BC, DR, HA, Pick Your Acronym Business Continuity, Disaster Recovery, High Availability, system uptime…   These are all terms that describe one of the most important needs