Security (Legacy)
3 Tips to Know Before You Sign With a Third-Party
There’s an abundance of software and products available to, in theory, create efficient business operations. It could be an email program for communications, an HVAC system or even a new vending machine to keep workers from being hangry. Regardless, each requires a sales process to buy. During those sales conversations it’s easy to have rose-colored glasses on and…
Read More6 Security Projects for 2020
The digital and cybersecurity space saw unprecedented evolution in the last decade, in terms of both technological and security developments and cyber incidents. We saw innovative technology change lives while hackers stole record-breaking amounts of data. As changes keep coming, we want to highlight how you can take back security starting in 2020 with these projects. 1.…
Read More5 tips to stay safe while online shopping
Black Friday and Cyber Monday are just around the corner! With the anticipated uptick in online shopping this year, not only is it convenient, but increases the number of targets for cybercriminals. Here are five quick tips to help you stay safe and protect yourself while online shopping. Use a secure payment method. Pay with…
Read MoreBack to Basics: Cybersecurity Habits
Smart Device Edition Though tools and solutions play a critical role in a security plan (and are often focused on), employees are equally important in maintaining the integrity of a strong cybersecurity plan. Human error is the cause of 90% of breaches. Instilling good cybersecurity habits is a smart, proactive aspect of a successful security plan. As…
Read MoreForescout: More Than Your Average NAC
Today’s Brite Insight is brought to you by one of Brite’s certified Forescout Engineers, Matt Ostrowski. Matt specializes in unique Forescout deployments and enjoys finding new ways to utilize the technology. When people are first exposed to Forescout, it’s typically as a Network Access Control (NAC) solution. But what is NAC? NAC is a security…
Read MoreCybersecurity Awareness Month
Your 2019 Cheat Sheet National Cybersecurity Awareness Month is the perfect time to take a step back and assess cybersecurity habits and practices. But rather than having to dig through hundreds of articles, we put together your 2019 Cybersecurity Awareness Month cheat sheet. Before we jump in, remember that there are plenty of things in life…
Read MoreIT Security: The Process That Never Stops
People, process and technology, when optimized together, are the three keys to improved IT security. To take it a step further, a successful security program is not one with an end-state, but rather one that is approached as a continuous orchestrated journey. Over time following a path will lead to success. If Rome wasn’t built…
Read MoreThe First Building Block of a Strong Cybersecurity Plan
by Justin Smith – Brite, President and COO An effective cybersecurity plan is an intricate web of tools and systems working together. From firewalls and endpoints to on-premise technology and the cloud, the security footprint is expanding and when it comes to securing it you have to start somewhere. The somewhere? Visibility. Why do you…
Read MoreSecuring a Network: Illumio’s PCE
If you’ve been following our previous posts, then you might have picked up on a trending topic that is critical in today’s security landscape. Visibility. In case you missed the other posts or just need a recap to jog your memory – if you don’t know what’s on your network (either device, application or user), then you can’t fully…
Read MoreSecuring a Network: Gain Control of Network Traffic
We’ve said it a million times, everyone has said it a million times – threats are evolving, networks are becoming more dynamic and traditional security approaches are no longer enough. These days, the combination of the influx of connected devices and changes to networks, creates the necessity of having full visibility and the ability to take…
Read More