Cybersecurity

Home > Security > Cybersecurity

Shadow IT Puts Your Cloud Environments – and Your Proprietary Data – at Risk

Shadow IT Puts Your Cloud Environments - and Your Proprietary Data - at Risk The number of software services that users have access to has exploded over the past decade. IT departments often fail to keep up with or deny user requests for new software, which can lead users to downloading the software themselves either on their [...]

2021-09-09T08:56:57-05:00September 9th, 2021|Cloud, Cybersecurity, Infrastructure, Security|

Mitigating L7 DDoS Attacks

Distributed denial-of-service attacks are one of the oldest cybersecurity threats. The cybersecurity industry has largely learned how to deal with these attacks. A majority of internet service providers and public cloud vendors are able to provide basic protection against most volume-based DDoS attacks. Hackers have adapted to these new protections that are now in place. One of the [...]

2021-08-09T09:27:43-05:00August 10th, 2021|Cloud, Cybersecurity, DDoS, Security|

Securing the Expanding Network Perimeter

Remote work, public cloud, SASE – Cloudflare, Cisco (Balancing Security, Performance, and Cost) Securing a company-wide network is imperative for any organization. Hackers have more opportunities than ever to break through network perimeters and steal valuable information. The reality is that the perimeter is vanishing due to continued expansion for organizations of all sizes. Companies need to protect [...]

2021-07-15T22:46:08-05:00August 2nd, 2021|Cybersecurity, Infrastructure, Networking, Security|

Credential Stuffing vs Brute Force – When Strong Passwords Are Not Enough

Credential Stuffing vs Brute Force Over the past couple of decades, we’ve been constantly reminded to use strong passwords. This was supposed to minimize the risk of an account takeover (ATO) and, more importantly, a full-blown data breach. Strong passwords were supposed to fend off brute force attacks, the most commonly used attack vector to break into [...]

2021-07-26T10:44:08-05:00July 30th, 2021|Cybersecurity, Security|

The Real Danger of Compromised Passwords

Every now and then, we receive email notifications warning us that our account might have been compromised in a data breach. In fact, if you have a Google account, you’ve probably seen a list of some non-Google accounts you own that have compromised passwords. If you haven’t been paying attention to these warnings, you really should. Here’s why. [...]

2021-07-26T10:46:58-05:00July 27th, 2021|Cybersecurity, Security|

Protecting End Users from Phishing Attacks

Protecting End Users from Phishing Attacks Last time, we introduced you to phishing attacks and explained why it’s something you need to be concerned about, especially in light of its recent resurgence. We promised to discuss how you can protect your end users from them, so here we are. Here are some of the countermeasures you can [...]

2021-05-26T14:52:12-05:00June 9th, 2021|Cybersecurity, Security|

Is the Resurgence of Phishing Attacks A Cause For Concern?

Is the Resurgence of Phishing Attacks A Cause For Concern? Easily one of the oldest attack vectors in the history of cybercrime, phishing attacks remain one of the most commonly used techniques for spreading malware, stealing credentials, infiltrating a network, or carrying out a range of nefarious acts on an organization. At the peak of the pandemic [...]

2021-05-18T13:44:35-05:00May 18th, 2021|Cybersecurity, Security|

Four Questions Before Deploying a NAC Solution 

You have been tasked with deploying a NAC solution. Unfortunately, IT leaders taking on this endeavor often find themselves confronted with some ugly truths about their network infrastructure and the bandwidth of their internal resources. ADAPTURE Cisco ISE expert Andy Thompson addresses four common questions utilizing his experiences with the industry-leading NAC solution Cisco ISE.   Question: What Can I Expect While Deploying a NAC Solution?  Answer: [...]

2021-03-02T17:21:11-05:00March 2nd, 2021|Cybersecurity, Infrastructure, Security|

Closing the Cybersecurity Gap with Managed Cisco ISE Services

ADAPTURE Solutions Architect Andy Thompson writes about why companies are turning to Managed Cisco ISE Services for a more comprehensive and effective cybersecurity solution. Ask just about any CTO or CSO what keeps them up at night.  The consensus of those individuals would be: “Do users that have access to our network that makes them capable of seeing [...]

2020-11-16T11:47:02-05:00November 16th, 2020|Cybersecurity, Infrastructure, Security|

Cisco SecureX: Cisco’s New Integrated Cybersecurity Solution

Your data center is full of individual solutions, many of which are incompatible. The complexity of the technology industry means that organizations are often running operations across dozens of tools from different OEMs that come with a plethora of varying dashboards, inconsistent integration, and inconsistent patching and maintenance demands. For cybersecurity professionals, gathering data across all your endpoints [...]

2020-10-13T09:44:17-05:00August 14th, 2020|Cloud, Cybersecurity, Infrastructure, Security|
Go to Top