Cybersecurity Awareness Month

Your 2019 Cheat Sheet   National Cybersecurity Awareness Month is the perfect time to take a step back and assess cybersecurity habits and practices.  But rather than having to dig through hundreds of articles, we put together your 2019 Cybersecurity Awareness Month cheat sheet.   Before we jump in, remember that there are plenty of things in life…

Read More

IT Security: The Process That Never Stops

People, process and technology, when optimized together, are the three keys to improved IT security. To take it a step further, a successful security program is not one with an end-state, but rather one that is approached as a continuous orchestrated journey.  Over time following a path will lead to success. If Rome wasn’t built…

Read More

Maximizing Your Security Investments

by Trevor Smith, EVP at Brite Global information security spending continues to grow by double digits year over year and is expected to reach $124b in 2019.  The combination of the digital transformation, emerging threats and new regulations are forcing organizations to focus on improving security practices.  As a result, a portion of that spend has been…

Read More

The Top 5 Takeaways from the RSS 2019

The 2019 Rochester Security Summit is in the books! After a full two days of meeting and hearing from security leaders, Brite is excited to share the top 5 takeaways from the event.  1. Act Smarter, Not Harder Rapidly growing digital footprints and infrastructures are forcing IT department’s resources to be stretched thin.  While the…

Read More

The First Building Block of a Strong Cybersecurity Plan

The First Building Blocks of a strong security plan|

by Justin Smith – Brite, President and COO An effective cybersecurity plan is an intricate web of tools and systems working together.  From firewalls and endpoints to on-premise technology and the cloud, the security footprint is expanding and when it comes to securing it you have to start somewhere.  The somewhere? Visibility. Why do you…

Read More

New smart device? Make sure it’s secure before using

Before you start asking Alexa or Google who won the football game, changing the thermostat behind your partners back or starting a rave with the new color-changing lights you have a few to-dos to take care of to ensure your privacy isn’t being invaded by your new connected device. Over the decades, we have been…

Read More

Securing a Network: Illumio’s PCE

If you’ve been following our previous posts, then you might have picked up on a trending topic that is critical in today’s security landscape. Visibility. In case you missed the other posts or just need a recap to jog your memory – if you don’t know what’s on your network (either device, application or user), then you can’t fully…

Read More

Securing a Network: Gain Control of Network Traffic

We’ve said it a million times, everyone has said it a million times – threats are evolving, networks are becoming more dynamic and traditional security approaches are no longer enough.  These days, the combination of the influx of connected devices and changes to networks, creates the necessity of having full visibility and the ability to take…

Read More

4 tips if you’re a victim of identity theft

We have posted about how to  protect yourself from identity theft, but even if you take all the proper precautions, your information could still end up in the wrong hands.  If you become a victim of identity theft, here are some tips on what to do. Take action. As soon as you notice unauthorized charges,…

Read More

Securing a Network: Forescout’s Core Capabilities

A problem that plagues organization’s capability to achieve complete endpoint protection is the inability to identify every device connected to the network.  In other words, organizations struggle to achieve full visibility.  To help solve that problem, Forescout Technologies revolutionized device visibility with a proven process attained through agentless visibility.     As discussed in this post, device visibility is essential to…

Read More