Cybersecurity Technology
Managing a SIEM vs. A Managed SIEM
IT departments clearly have its hands full with daily tasks spanning from managing computer systems, maintaining the network infrastructure, troubleshooting issues, managing SIEM to hardware and software maintenance, both network and device protection and much more. With rapidly growing digital footprints and infrastructures, IT departments’ responsibilities won’t be slowing down any time soon. In correlation with…
Read MoreManaging the Flow of Devices (better than Lucy)
If you are a fan of classic comedy television, you probably know this “I love Lucy” skit: In this situation, Lucy and Ethel have no problem with the slow trickle of chocolates, but the belt speeds up and the influx of Chocolates is just too great for the ladies, despite their creative efforts! As an…
Read MoreHealthcare breaches: The epidemic people aren’t talking about
Research estimates healthcare data breaches may cause as many as 2,100 deaths a year in the United States And within the last month… Mar. 20, 2019 – Zoll Medical: 277,319 patients personal information was exposed Mar. 4, 2019 – Rush System for Health: 45,000 patients personal data compromised Feb. 22, 2019 – UConn Health: more than 326,000 patients personal data compromised Feb.…
Read More5 tips to protect your information and passwords
In today’s digital world, virtually everything uses a password. We use them to get into our phones and computers, to access our bank and social media accounts. Essentially, we put in a password for every account that requires a username. But why? To secure and protect our data. Passwords help to authenticate who we are.…
Read MoreAre you in love with your managed service provider?
5 signs it’s not the one Falling head over heels for your managed service provider isn’t something you probably ever dreamed of as a child but if you don’t get butterflies thinking about your MSP and what it does for your organization, then it’s probably not the one. Just because it may get the job done,…
Read MoreData Privacy in 2019
Data privacy has been top of mind for both individuals and corporation over the past few years. 2018 spotlighted the conversation with events like the passing of the GDPR regulation and multiple big-name breaches from corporations including Marriott, Facebook and Google. As a result, there is added pressure and expectations for companies to take the proper…
Read MoreTop 5 Security Projects of 2019
Not every project can be done all at once, so our team at Brite compiled a list of the top 5 security project for 2019 to help guide you in this season of planning. Below are the 5 most critical projects to ensure proper protection of your devices, network and cloud infrastructures. 1. Device visibility The…
Read MoreWhat is the most secure payment method?
The holiday season is officially here! What does everyone do in preparation for jingle bells, tree trimming and candle lighting? Shopping of course! No one wants to ruin the holidays is by becoming a victim of a fraudulent attack. Attacks on personal data happen both online and in-stores, and rethinking your payment method is the…
Read MoreBreach Breakdown: Nordstrom
What Happened: Nordstrom Another week, another retail breach. Nordstrom is the latest retailer to experience a data breach. But, this breach is unlike the others because it exposed employee, not customer, information. The exposed information includes: Employee names Social Security numbers Dates of birth Check account Routing numbers Salaries Nordstrom did not disclose the number…
Read MoreBreach Breakdown: HSBC
What Happened: HSBC bank is notifying U.S. customers of a breach that has compromised personal and financial data. The attack occurred over a 10 day period, from October 4 to October 14. After HSBC detected the breach, the bank announced it “suspended online access to prevent further unauthorized entry” to affected accounts. While the bank…
Read More