Archive

Meltdown and Spectre: Don’t Panic

Meltdown and Spectre: Don’t Panic

The New Year has greeted us with the startling news of two recently announced vulnerabilities called Meltdown and Spectre.  The root cause of the problem is related to technology designed to make your systems perform better.  I’ll explain: CPUs spend most of their...
7 Steps to Network Infrastructure Security

7 Steps to Network Infrastructure Security

Poor Bob from Accounting. He had a vendor come through last month – she had a laptop and needed to plug in to show him her presentation. So Bob gave her access to the network and by the time she showed the last slide of her PowerPoint, half of the servers were...
6 Steps to Internet Edge Security

6 Steps to Internet Edge Security

You’ve read the news, you’ve seen the stories, you have peers who have been hit. Ransomware, worms, phishing, intrusion and malware have become commonplace in our digitized society, and with the rapid growth of industrialized hacking, the problem is only...
Who’s In Your Network?

Who’s In Your Network?

Providing wireless access to your guests is like opening your back door because you want to make your house more accessible. Let me tell you a story: We had a client who was absolutely convinced they were secure. Their intrusion prevention and malware protection was...