How are you controlling BYOD devices?

  Seeing is believing, control is even better. It is no secret that the number of connected devices has and will continuing to grow at an explosive rate.  Gartner estimates by 2020, the number of connected devices will exceed 20 billion. For me, it is pretty easy to believe their estimate.  Like most people, I…

Read More

The New Generation of Criminals

You turn on your computer and find a notice that all your files have been encrypted and will be destroyed unless you pay a ransom. There’s a clock ticking down the seconds. Your files are being held hostage and so is your organization. Paying ransom is the least of your worries; the biggest cost to your business will be the…

Read More

Top Attacks and Breaches for the week of March 14th to 20th

One of Brite’s partners, Check Point, complied the a list of Top Attacks and Breaches that took place last week, March 14th – 20th, 2016.  Cyber threats transform at a rapid rate.  Yesterday’s technology may not protect against tomorrow’s attacks. Fortunately, Brite has many partners that are continuously developing new technologies to protect your data.   Click…

Read More

Rochester Security Summit: Jonathan Borgesen

The countdown is on! The Rochester Security Summit is 26 days away, and this is the first edition of Rochester Security Summit Thursday. Every Thursday until the event, we’d like to give you a bit of what conference attendees will experience. First, let’s talk about the theme of this year’s event. The theme of this…

Read More

Mistakes Happen: Sharing Sensitive Data With the Wrong Person

We’ve all made the mistake. The dreaded “Reply All” button response that was meant for one person but sent to the entire office. Mistakes happen and a small one like that is nothing to fret over, other than the potential awkward conversation in the hallway. Of course, there’s always the bigger mistake. Sharing sensitive company…

Read More

Securing Privileged Accounts

When managing privileged accounts on your network there is a particular feeling that you want to avoid. You, and your information security team, should never feel like a game of hide-and-seek has broken out. On average, there are three to four times more shared and privileged accounts than employees in an organization. So while you’re…

Read More

2014’s Worst Passwords Will Make You Cringe

Homer Simpson’s catch phrase is one, simple word: D’oh! And no better word could sum up how we’re feeling after reading SplashData’s annual list of worst passwords of the year. In fact, if people were smart enough to use D’oh as their password, it’d be more secure than about 99% of 2014’s worst. Most alarming,…

Read More

Combating BYOD Security Issues

Today, mobile devices come in all shapes and sizes, from smartphones, notebooks and tablets, to the new Smartwatch. While this mobility boosts efficiency through “anywhere, anytime access” to business systems it creates an equal amount of uncertainty and vulnerability for the organization. With 81% of employees currently using personal devices at work, security managers have…

Read More