Alex

Join Brite at RSS!

We are now days away from the Rochester Security Summit (RSS)! Join us and other cybersecurity professionals at RSS on October 9-10 at Rochester Riverside Convention Center to learn about cutting-edge technology for the cybersecurity industry.  Stop by our booth to talk to our reps on how Brite can help you Break Through the Clutter! In …

Join Brite at RSS! Read More »

AI and Cybersecurity: The Battle Between Good and Evil

From Siri and Watson to self-driving cars – artificial intelligence (AI) is becoming part of our everyday life. Machine learning, one type of AI, allows the automation of processes and human-like decision making. The substitute of human effort for AI has certainly found its place in cybersecurity. The Good AI is being applied in one …

AI and Cybersecurity: The Battle Between Good and Evil Read More »

Breach Breakdown: Veeam Exposed Customer Records

What happened: Veeam, a Swiss-based data company exposed more than 445 million records after using a misconfigured host on Amazon Web Services.  The issue was that it did not require any password to access. An independent security researcher, Bob Diachenko, discovered the open database on September 5. Diachenko notified Veeam about the issue but received no response.  …

Breach Breakdown: Veeam Exposed Customer Records Read More »

Hurricane Florence: Tips to Prepare Your Business

Today’s blog is brought to you by our partner Datto.   Republished from Datto’s Blog Originally published on September 10, 2018 By Chris Brunau Hurricane Florence is expected to make landfall as a Category 4 storm. Florence is capable of catastrophic damage with maximum sustained winds of 130 miles per hour. The storm is expected to make landfall …

Hurricane Florence: Tips to Prepare Your Business Read More »

The Use of Video by Law Enforcement

To keep the public safe, law enforcement agencies have always relied on the latest technology.  Each decade of the 1900s can be marked by the introduction of a critical investigative technology.  1900s: The introduction of fingerprinting  1920s: The introduction of the polygraph machine  1930s: The introduction of two-way radios  1940s: Radar detectors used to capture vehicle speeds  1950s: Electronic data processing machines summarized arrests and warrants  1960s: The introduction …

The Use of Video by Law Enforcement Read More »

3 Ways to Create a Cybersecurity Culture

The average cost of a data breach is $3.86 million globally.   Non-malicious employee error is typically the cause of a data breach. Unfortunately, it doesn’t matter what IT security system an organization has in place if employees aren’t educated on the importance of cybersecurity.   Establishing a cybersecurity culture requires everyone to have an equal part in cybersecurity, which is essential in protecting the organization. To create or strengthen your cybersecurity culture, use these three tips.  …

3 Ways to Create a Cybersecurity Culture Read More »