Looking at the How and Why of Windows 10 Migrations

Drama-free has been a good way to describe the list of the world’s most used operating systems over the last several years. The most recent figures have Windows 7 comfortably in the top spot with just over 49% of the desktop market, according to research conducted by NetMarketShare. This is a position Windows 7 has […]
What the Feds' Healthcare Security Moves Mean For the Rest of Us

The healthcare industry is under cyber assault. Few industries have been impacted by recent security incidents quite like healthcare companies. In May, WannaCry shut down emergency rooms and other medical services for 16 National Health System facilities in the U.K. Last month, the drug manufacturer Merck experienced a ransomware attack that affected all of their offices […]
10 Ways You May Not Be Using Log Analytics (But Should Be)

Not seeing a problem isn’t the same as not having a problem. Hackers and bad actors have gotten very good at carrying out their crimes without arousing suspicion. As such, malicious activity can go on for months or even longer without drawing attention to itself. By the time someone does notice – or the attackers […]
Shining a Light on Shadow IT and Taking Back Control of the Cloud

In the beginning there was the firewall . . . Several years back, organizations did not even think about users signing up for their own applications. This is because each application required access to resources that were beyond their control. Storage, compute, and network configurations were all IT’s domain and so IT needed to be […]
Cisco Live 2017: Everything Your Business Needs to Know

The evolution of networking is all about the DNA. Cisco Live, the company’s yearly tech summer camp, wrapped up last Thursday amidst the sweltering summer heat of Las Vegas. Cisco used this opportunity to showcase the evolution of the security, scale, and simplicity inherent to the next generation network. The key platform launched last […]
North Korea, Russia and Their Effect on Your Cyber Security

Names like “Sandworm” and “Hidden Cobra” may sound as though they were pulled from the pages of an epic sci-fi novel, however, the threats they pose are very real. These fantastical monikers actually refer to a pair of shadowy – and allegedly state-sponsored – global cybercrime initiatives. Upon closer inspection, the tactics and endgames employed […]
Petya, WannaCry Defense Should Be Easy – Here’s Why

The dust hasn’t even settled on WannaCry and yet there’s already a new global ransomware epidemic making headlines. Just last week, Australian police discovered WannaCry, the malware strain that dominated tech coverage back in May, in some of their traffic cameras. This WannaCry aftershock was upstaged this week, however, by Petya (also known by several […]
The Stigma of Patching Lowers Innovation

IT has had a long and sordid history with patching. From servers to desktops, Windows to Linux, it is the fear and bane of the IT administrator’s existence. A delicate balance has been struck between the risk of not patching and using third party tools to address security issues, but as the recent WannaCry and […]
Feds Warn of Sophisticated Cyber Threat: 5 Steps to Take Now

Do you know where your administrator credentials are? Hopefully, the answer to that is “With my administrators.” However, it may not be the only answer as per a recent warning issued by the federal government. The National Cybersecurity and Communications Integration Center (NCCIC) has uncovered what it calls an “emerging, sophisticated campaign,” one that uses […]
Is Your Security Team Staffed With “A” Players?

I really hate going to the dentist. It’s the worst. I have to schedule time out of my week, sit endlessly in the waiting room (in reality it’s five minutes, but it feels like forever), and then the real pain begins when I start getting poked and prodded. Overall, it’s awful, and for that reason […]