Security

Think Forward.

ADAPTURE Partner FireEye Featured on CBS’ 60 Minutes

FireEye leader Kevin Mandia speaks about FireEye’s involvement in the Sony cyber-attack response [Video link at bottom of post.] Those of us working in technology have always understood the dangerous consequences of poor security around your network and infrastructure—where sensitive data typically resides. But with companies being hacked seemingly every day now, cybersecurity is now part of the [...]

2015-04-17T11:29:00-04:00April 17th, 2015|News & Press, Security|

ADAPTURE Joins Technology Association of Georgia’s Cybersecurity Simulation for the Second Consecutive Year

Cybersecurity simulation event demonstrates risks associated with cyber threats toward Georgia Businesses ATLANTA, Ga., Mar. 2015 — The Technology Association of Georgia (TAG) is holding its annual cybersecurity simulation on May 5 at Southern Polytechnic State University. Demonstrations at this event simulate cyber attacks, reinforce preventative measures, and address recovery actions in the instance of an attack. Security [...]

2024-07-18T12:19:17-04:00April 15th, 2015|News & Press, Security|

[Infographic] A 2014 Study of Company Data Breaches

Data breaches can have a devastating effect on an organization, and recent trends are showing that the cost of recovery from a data breach is rising. A recent study of company data breaches shows since 2013 that the average total cost of a data breach increased 15% to $3.5 million. The study also found that the countries least [...]

2015-04-06T16:14:34-04:00April 6th, 2015|Security|

[WATCH VIDEO] ADAPTURE Tailoring Your Security Event Presented by Dell SonicWall

Video recap of the Tailoring Your Security event ADAPTURE hosted with Dell at Maggiano's Little Italy, Atlanta. ADAPTURE Senior Security Consultant Elliott Abraham delivered a security seminar while guests dined. Each guest left with a complimentary custom shirt order from Tom James! To learn more about ADAPTURE security solutions, or other events like the Tailoring Your Security event, [...]

2025-02-21T09:29:17-05:00April 1st, 2015|Security|

[INFOGRAPHIC] Protect Yourself from Harmful DDoS Attacks

DDoS is a type of DOS attack and is an attempt to overload an online service by overwhelming it with traffic from multiple sources. Anyone is susceptible to these attacks and as time passes, they are becoming more destructive. Protect yourself from these harmful attacks and read our DDoS Infographic. Protect yourself from becoming the victim of a [...]

2024-06-17T14:50:11-04:00March 24th, 2015|DDoS, Security|

[INFOGRAPHIC] Data Center Downtime Cost

Disaster Recovery is often neglected because it doesn't generate revenue or reduce costs. However, without a strong data recovery solution, your organization may lose thousands of dollars due to data center downtime. To take a more business-centric approach, you'll need to step outside your comfort zone and demonstrate the value that data recovery brings to the business. Get [...]

2015-02-11T16:10:00-05:00February 11th, 2015|Security|
  • Disaster Recovery

Disaster Recovery: Your Company’s Data Needs a Hero

In this post: Learn how to develop a disaster recovery plan for your organization after a virtual attack.  From natural disasters - like Hurricane Sandy in October 2012 - to issues such as human error, malicious attacks, data corruption and storage failures, there are many “villains” seeking to harm your organization’s valuable data. But businesses don’t have to live [...]

2015-02-02T17:42:01-05:00February 2nd, 2015|Security|
  • byod

5 Things To Do Before You BYOD

The company-issued Blackberry died, and no one cared. According to a 2014 Webroot survey (PDF), 61% of companies support bring your own device (BYOD) or the use of employee-owned devices for company functions. Because we no longer control every device, how can we implement BYOD security to keep users and, perhaps more importantly, company data safe? BYOD Preparations [...]

2024-07-18T12:45:50-04:00December 11th, 2014|BYOD, Security|
  • f5 Cloud Security

Renting the Castle: F5 Cloud Security

Software is taking over the world. Have you heard that one before? The rise of public clouds like AWS and vCloud Air moves your data from your protected data center and into someone else’s domain. It’s one thing to protect your infrastructure if you own it, but what if you don’t? Cloud security requires a change in thinking. [...]

2014-12-02T17:34:13-05:00December 2nd, 2014|Cloud, Security|
  • Cloud Security in 7 Steps

Cloud Security in 7 Steps

We’ve talked about how the security breaches in 2014 can make IT security feel like a Hollywood slasher. Sticking together will help, but what about some practical tips for staying safe out there? Here's cloud security in 7 steps. 1. Protect more than the perimeter. Think about the number of people who have access to your network: employees, [...]

2014-11-14T17:28:45-05:00November 14th, 2014|Cloud, Security|
Go to Top