Cybersecurity Technology
The Realization Security is Not Built-In
The cyber threat landscape is a scary one and it is not getting any better. After spending over 15 years in different areas of technology with large organizations such as Oracle, Microsoft, Nortel, I just assumed that security was built into everything and all aspects of a company are secure. You know what they say when you assume. Since joining a company where cyber security…
Read MoreHow to Prevent Privileged User Account Breaches
Today’s Blog is brought to you by Ryan Conley, an Account Executive at Brite Computers. Most big breaches over the past 2 years can be tied back to mismanaged privileged account credentials. In the Target breach, someone had gained access to a privileged account through their HVAC contractor. Home Depot fell prey to a similar attack when a hacker used a person’s username and password to gain access to the network…
Read MoreTop 7 Security Concerns of 2017
A common New Year’s Resolution is to be vigilant against advance security threats. Fulfilling that resolution each year requires a more comprehensive approach as technologies evolves and attack methods become both more sophisticated and prevalent in our lives. As the new year begins, most organizations are putting their plans and tools in place to meet…
Read MoreSee the forest for the Trees
The human nervous system includes 5 senses with a dedicated sensory system for each. While all important to our personal lives, Sight is probably most important in the professional lives of information security and technology staff. To make informed decisions, we need to See everything connected to the network and understand the meaning of critical…
Read MoreHow are you controlling BYOD devices?
Seeing is believing, control is even better. It is no secret that the number of connected devices has and will continuing to grow at an explosive rate. Gartner estimates by 2020, the number of connected devices will exceed 20 billion. For me, it is pretty easy to believe their estimate. Like most people, I…
Read MoreTop Attacks and Breaches for the week of March 14th to 20th
One of Brite’s partners, Check Point, complied the a list of Top Attacks and Breaches that took place last week, March 14th – 20th, 2016. Cyber threats transform at a rapid rate. Yesterday’s technology may not protect against tomorrow’s attacks. Fortunately, Brite has many partners that are continuously developing new technologies to protect your data. Click…
Read MoreRochester Security Summit: Jonathan Borgesen
The countdown is on! The Rochester Security Summit is 26 days away, and this is the first edition of Rochester Security Summit Thursday. Every Thursday until the event, we’d like to give you a bit of what conference attendees will experience. First, let’s talk about the theme of this year’s event. The theme of this…
Read MoreMistakes Happen: Sharing Sensitive Data With the Wrong Person
We’ve all made the mistake. The dreaded “Reply All” button response that was meant for one person but sent to the entire office. Mistakes happen and a small one like that is nothing to fret over, other than the potential awkward conversation in the hallway. Of course, there’s always the bigger mistake. Sharing sensitive company…
Read MoreWhy Fixing Security Vulnerabilities Sooner, Rather Than Later, is Important
Getting your education takes a long time. Securing a home loan tends to be a longer process, as well. Both make sense and are commonly referred to as “the way it is.” What doesn’t make sense is the information that was revealed in NopSec’s 2015 State of Vulnerability Risk Management. Summed up: Remediation issues are…
Read MoreSecuring Privileged Accounts
When managing privileged accounts on your network there is a particular feeling that you want to avoid. You, and your information security team, should never feel like a game of hide-and-seek has broken out. On average, there are three to four times more shared and privileged accounts than employees in an organization. So while you’re…
Read More