Security

Threats to your users outside of your network got your terrified?
Amy Gregory  |  October 31, 2017
Today’s enterprise user is spending more time outside the safe haven of the network’s security and roaming on other networks in the big, terrifying world, keeping many an IT administrator awake at night wondering, “What can I do to protect our data when I don’t even know where they are?” EEK!
Challenges & Strategies when Upgrading Cisco ISE
Reanna Gutierrez  |  October 03, 2017
Cisco Identity Services Engine (ISE) helps IT professionals meet enterprise mobility challenges and secure the evolving network across the entire attack continuum. I recently sat down Josh Gross, a OneNeck security engineer, to discuss Cisco ISE and some of the challenges he’s seeing customers face when upgrading their ISE solution.
How to “AMP” Your Endpoint Protection
Amy Gregory  |  September 07, 2017
Malware is a broad term that encompasses any form of software designed to damage, steal or corrupt data. Ransomware, trojans, worms and rootkits are common malware examples, but the list is far more exhaustive, making fighting malware a normal part of operations for SMBs and corporations alike. But one cannot begin addressing the threat landscape without considering the risk endpoints bring into an organization.
Rethinking IT Security in an Age of Digital Disruption
Amy Gregory  |  August 17, 2017
While digital transformation is reshaping the way companies do business, it is also forcing companies to reshape the way they approach their security. Traditional approaches to security just aren’t good enough anymore. To counter the increasing stealth and persistence of modern cyber threats, organizations need to shift to a more holistic approach to cybersecurity that integrates technology with human behaviors and physical considerations.
4-Step Approach to Mitigating DDoS Attacks
Reanna Gutierrez  |  August 10, 2017
Distributed Denial of Service (DDoS) attacks aren’t like other types of cyber-attacks. They don’t spread malware into your network, and they don’t directly hijack sensitive data or steal from bank accounts. However, the financial and reputational damage caused by DDoS can be devastating to your business. They are also one of the most difficult types of cyber-attacks to defend against.
Protect Your Business from Ransomware with this 8-Point Checklist
Amy Gregory  |  July 18, 2017
More than half of organizations experienced a ransomware incident last year, and the threat continues to be at the top of mind for IT. Are you sure you’re doing everything you can to protect your organization?
Happy Tech Dependence Day
Reanna Gutierrez  |  July 04, 2017
Today’s businesses are heavily dependent on IT. This increased reliance on 24/7 access to data and mission-critical applications to get business done makes high availability a top priority for IT, especially when leveraging outsourced support.
Understanding a CIO’s Role in Cybersecurity
OneNeck IT Solutions  |  June 29, 2017
The successful businesses of yesteryear were built on legacy and on-premise data centers, posing challenges to modernizing systems. Today’s CIOs must achieve a delicate balance between meeting business objectives while providing security for their most critical data and systems.
Using the Cloud Without Compromising Security
Amy Gregory  |  May 23, 2017
When it comes to cloud security, choosing the right cloud service provider can be a real challenge. While the reasons to add the cloud to your infrastructure varies by organization, one thing is certain — security needs to be a priority.
Q&A with a Security Executive, OneNeck’s Katie McCullough Vice President, Information Security & Business Applications
Amy Gregory  |  April 13, 2017
There’s no doubt about it, today’s security threats are top of mind for any modern executive. The impact of a security breach can be detrimental to any organization’s continued success, and as a result, a sound security strategy is paramount. Join us as we chat with OneNeck’s top security executive about today’s mounting threats.
Do You DARE? Protect Your Data at Rest with Encryption
Jared Hedman and Reanna Gutierrez  |  April 11, 2017
Sensitive business data at rest in the cloud is more vulnerable than ever before. Ensuring that this critical corporate data is secure against unauthorized access and meets any organizational policies, industry or government regulations, is of critical importance to many CIOs.
Critical Security and Compliance Considerations for Hybrid Cloud Deployments
Reanna Gutierrez  |  February 09, 2017
In order to meet the security and compliance requirements for hybrid cloud deployments, organizations must adopt information security best practices and apply them to the cloud.
Cloud – The Security Game Changer
OneNeck IT Solutions  |  January 12, 2017
As organizations increasingly move to the cloud, security has become a bigger concern. IT departments are having a more difficult time controlling user access and understanding where their data resides, making it harder to distinguish between what is inside vs. outside the perimeter.
Shadow IT Risks Greater with Hybrid Cloud
OneNeck IT Solutions  |  January 05, 2017
The adoption of cloud is on the rise as more and more companies come to understand the massive advantages of doing business in the cloud. Particularly popular are "hybrid" cloud solutions that allow users to reap the benefits of both on-premises and cloud technologies at the same time.
Securing Your Azure Deployment
OneNeck IT Solutions  |  January 03, 2017
Microsoft Azure is known for its excellent security measures, but the responsibilities must be shared between the vendor and the enterprise.
Cloud Video-Security and Compliance
OneNeck IT Solutions  |  December 01, 2016
Keeping sensitive data safe and secure is priority but the effort and resources required to keep pace are immense. Cloud may be the answer.
Cisco Adaptive Security Appliance (ASA) SNMP Remote Code Execution Vulnerability
OneNeck IT Solutions  |  August 18, 2016
A vulnerability in the Simple Network Management Protocol (SNMP) code of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code.
Is your biggest security threat from within?
Amy Gregory  |  August 04, 2016
Insider threats from employees and business partners represent one of the largest risk factors organizations face. IBM found that in 2015, 55% of breaches came from the inside. Even though almost half of these attacks were inadvertent rather than malicious, IT departments need to be prepared to prevent and mitigate internal security threats.
Enterprise Mobility vs. User Privacy and Security
OneNeck IT Solution  |  May 18, 2016
As mobility and the Internet of Things (IoT) converge, and cyber threats continue to loom large, the need to focus on balancing data security with employee and customer privacy is top of mind for IT departments around the world. At the same time, IT departments are struggling with how to meet user demand in the age of everything connected, from devices to wearables. In addition, IT must find ways to meet compliance regulations and assure senior leadership that the company’s sensitive data is safe and secure.
Addressing Common Cloud Security Concerns (Part 2)
 |  April 21, 2016
The risks will vary depending on how an organization uses the cloud, whether in a public, private, or hybrid cloud model. No matter what cloud architecture your organization adopts, there are measures you can take to mitigate your risk.
In 2016…Cloud Security Challenges Rise From Within
Reanna Gutierrez  |  March 31, 2016
4 Common Cloud Security Concerns
Reanna Gutierrez  |  March 22, 2016
Whether public, private or hybrid, the cloud is now the most common deployment platform. In fact, research shows that around 88 percent of buyers who had a deployment preference preferred the cloud over on-premise. But even with the surge in confidence and adoption, many organizations still have concerns about security in the cloud. Cyber threats are a real and present danger and cybercriminals are hard at work trying to breach both cloud and on-premise deployments every day.