Maximizing Fax Security In Regulated Industries
Why Are Businesses Still Using Faxes? With the advent of email, you would think faxing would be a thing of the past. However, habit and technical hurdles still make using fax technology easier in some cases. For example, doctors and hospitals need to share media records, but different databases can’t talk to each other digitally. […]
Understanding the Equifax Breach & Filling The Gaps On Future Email Security
Equifax breach. Major holes in network were not updated and closed. Are you aware of the holes in your network? Recently we saw a flurry of “anniversary” stories regarding the Equifax breach. The breach compromised crucial personal data of more than 147 million people – the Social Security numbers of nearly all of them, […]
Homeland Security warns MSPs about APT actors
Wednesday October 3rd 12:30pm PST – U.S. Department of Homeland Security (DHS) is advising MSPs (managed services providers) and CSPs (cloud services providers) about advanced persistent threat (APT) actors “actively exploiting trust relationships in information technology (IT) service provider networks around the world.” The annoucement to the Department of Homeland Security warning is here. Further […]
Open .git directories could expose sensitive data
Criminals never stop, Cyber criminals too, and so (Cyber) crime fighting can’t take a break either. But like we say at Shield every IT hero needs a good team behind them. Today we learned of a potential data breach threat lurching in git repositories. One of the good guys, Vladimír Smitka, reported that nearly 400,000 […]
Exploit What?
Within seconds of visiting a webpage the site begins to gather intel on your system. All this information can be used to pinpoint specific weaknesses in applications, environments, and or browser vulnerabilities. Exploit kits are prolific on the Internet, and open your system up to any number of attacks. Here are 5 ways to securely browse the Internet. […]