Security (Legacy)
AI and Cybersecurity: The Battle Between Good and Evil
From Siri and Watson to self-driving cars – artificial intelligence (AI) is becoming part of our everyday life. Machine learning, one type of AI, allows the automation of processes and human-like decision making. The substitute of human effort for AI has certainly found its place in cybersecurity. The Good AI is being applied in one…
Read MoreHurricane Florence: Tips to Prepare Your Business
Today’s blog is brought to you by our partner Datto. Republished from Datto’s Blog Originally published on September 10, 2018 By Chris Brunau Hurricane Florence is expected to make landfall as a Category 4 storm. Florence is capable of catastrophic damage with maximum sustained winds of 130 miles per hour. The storm is expected to make landfall…
Read MoreThree Networks Every Company Needs
Today’s Brite Insight is brought to you by one of Brite’s certified ForeScout Engineers, Matt Ostrowski. Matt specializes in unique ForeScout deployments and enjoys finding new ways to utilize the technology. Network access control, or NAC, allows you to pre-determine a set of parameters and policies that either allow or deny a device access.…
Read More3 Ways to Create a Cybersecurity Culture
The average cost of a data breach is $3.86 million globally. Non-malicious employee error is typically the cause of a data breach. Unfortunately, it doesn’t matter what IT security system an organization has in place if employees aren’t educated on the importance of cybersecurity. Establishing a cybersecurity culture requires everyone to have an equal part in cybersecurity, which is essential in protecting the organization. To create or strengthen your cybersecurity culture, use these three tips. …
Read MoreGoin’ Phishin’
Fishing is a great way to enjoy the outdoors with family and friends. Tossing in a line at a favorite fishing hole, hoping for a big catch, is how many people spend their time in the summer. More experienced people know where to go to maximize the chance of reeling in that prize fish. The…
Read MoreHomeHack: How Hackers Could Have Taken Control of LG’s IoT Home Appliances
During the holiday season people are rushing around scooping up the latest tech gadgets for loved ones (or occasionally themselves). The focus on is on seeing a person’s face light up when they unwrap that perfect gift. No one is thinking of the possible personal or corporate vulnerability it may cause. Keep that in mind…
Read MoreWhy Organizations Should Look at Penetration Testing
Today’s blog is brought to you by Todd Palma. Todd brings over a decade of technology sales experience to Brite. Through working with organizations of all shapes and sizes, he has been able to identify and respond to market place trends. Hackers and cyber thieves are getting more creative every day in an effort…
Read MoreThe DFS Cybersecurity Regulation 23 NYCRR 500 Marathon
Today’s blog is brought to you by Trevor Smith, EVP of Sales and Marketing at Brite. Trevor has 20 years of technology experience and a passion for problem solving with cutting edge technologies. Monday, August 28th, marked the first deadline in the New York Department of Finance Cybersecurity Regulation 23 NYCRR 500. There have been…
Read MoreThe New Age of Sharing Cybersecurity Data
Historically, one of the largest obstacles for cybersecurity professionals to deal with was the lack of automated data sharing between legacy tools. This lack of communication drives a need for human intervention in sharing potential security risks data between tools and IT departments. Obviously, with the level of threats we see today this process is…
Read MoreEndpoint Security: Everybody Needs Something
Cyber-attacks have become the norm. Organizations are aware of the ongoing threats day in and day out, but there is an undeniably scary trend. Prevention of attacks should be the priority, but too many organizations wait until they have been breached to implement the correct security tools. The question is, why is this happening and…
Read More