IT Security Solutions
National Cyber Security Awareness Month (NCSAM)
Cyber security is an increasingly important part of our personal and professional lives, and 2019 marks the 16th year of National Cyber Security Awareness Month (NCSAM). To engage and educate Americans on proper online security etiquette, the U.S. Department of Homeland Security and the National Cyber Security Alliance created NCSAM. Connection is proud to be an official Champion of NCSAM. We’re dedicating the month of October to spreading the word about cyber security, and providing tools and resources to help you stay safe and secure online.
Stay tuned all month long for advice from our experts on building a strong, cost-effective security plan.
Cyber Security from the Cisco Point of ViewIn this episode of our TechSperience podcast series, our host, Penny Conway, talks with David Booth, Technical Sales Executive for Cisco Solutions Architecture, and Marsilda Bialczak, Cisco Product Development Specialist. Together with our Cyber Security Team, they demystify the Cisco Meraki partnership, Cisco Umbrella, Cisco's collaboration with Duo, and the importance of zero-trust security.
Microsoft Roundtable: SecurityIn episode 17 of our podcast series, Lane Shelton, VP of Microsoft Center of Excellence, speaks to cloud security and the many features and benefits in the Microsoft tech stack—including Windows 10 and Microsoft Office 365—and how they create a safer work environment for digital transformation. The Connection Cyber Security Team will also discuss risk management and the need to utilize the security tools Microsoft offers.
All Things HP and All Things SecurityContinuing our National Cyber Security Awareness Month podcast series, Sarah Bates, Partner Business Manager from HP discusses with our host, Penny Conway, and the Connection TSG Cyber Security Team, how HPs innovative security features can fit into your Organization's security practice to help eliminate critical threats.
KICK-OFF part II to National Cyber Security Awareness MonthEpisode 15 is part 2 of our continued round table discussion to kick-off National Cyber Security Month starting tomorrow. What would happen if you talked with experts about some interesting, crazy and scary cyber security issues they've come across? Listen in to a very interesting Cyber Security Podcast.
KICK-OFF to National Cyber Security Awareness MonthEpisode 14 is a Round table discussion with the TSG Cyber Security Team as they talk about the fact that you've probably already been compromised on a security level. How to prepare for the when - it's not a matter of if, it's a matter of when you're going to get compromised and next steps.
Must listen Cyber Security Roundtable: Part 1The security of your infrastructure is as important to you as it is to Connection’s Technology Solutions Group. Listen to this podcast to learn more about what security really means and how risk management plays a large part in best practices.
Are you browsing on a secure connection? Look for the in the address bar to know your data is safe.
Connection Community News on Cyber Security
October 15, 2019
Enable Multifactor Authentication For Added Security
Authentication usually requires a username and password. This is considered single factor authentication. MFA adds another step in the authentication process by requiring a second factor—or some other form of evidence—from the user. This can be a personal identification number (PIN) or the response to a challenge question (something the user knows) or an automatically generated token (something the user has). Multifactor authentication can also use biometric factors (something the user is), such as a fingerprint, facial recognition, or retina scanning.
October 10, 2019
Shake Up Your Passphrase Protocol
What makes a strong password? Many of us are overly familiar with the standard password guidance of a minimum of 8 characters, a mix of upper and lower case letters, and at least one special character (e.g. @, #, or $). This guidance was provided by the National Institute of Standards and Technology (NIST) in 2003. We also should rotate our password (at a minimum) every 90 days. Many organizations today are enforcing their password policies to follow these “rules.”
October 08, 2019
Best Practices for Keeping Tabs on Your Apps
Let’s start this conversation out with the definition of device. The list of what constitutes one is growing. For now, let’s say that you have a home computer (desktop, laptop, or both), work computer (desktop, laptop, or both), home tablet, work tablet, personal smartphone, and work smartphone. This is a pretty extensive list of devices that an adversary could use to attack you professionally and personally.
October 03, 2019
Update Your Privacy Settings
Keeping up with your privacy settings can be daunting. Think about all of the places where your privacy settings are stored: on e-commerce and social media sites, in email and Web browsers, on your mobile devices and in their apps—the list goes on. Social networks alone—Facebook, Twitter, Instagram, Pinterest, and Snapchat for instance—all have their own privacy settings. How does anyone really keep up?
October 02, 2019
Never Click and Tell: Staying Safe on Social Media
It is a daily occurrence for many of us: when there are a few minutes of downtime, we check personal email, followed by a “quick” look at our social media accounts. While navigating the maze of a-friend-of-a-friend profiles, or clicking on a URL to bring up an article you discovered on twitter, do you ever stop to ask “How susceptible are my social media profiles?” or “What if that link I just clicked is malicious?”
Across the global technology theatre, phishing, whaling, and impersonation-based attacks continue to pose substantial risks to organizations around the world. Quite simply, these email attacks utilize social engineering tactics to convince employees to supply critical data. Experienced cyber criminals take full advantage of similarly spelled domain names and/or free email accounts—such as YAHOO and Google—to impersonate outside sales representatives or business leadership.
September 20, 2019
National Cyber Security Awareness Month Is Almost Here
When was the last time you thought about your network security? It was probably more recently than your endpoint security. Most of the time, when thinking security, you want to protect stored data on a server or Wi-Fi. However, most users are more concerned with the data on their PCs or printouts. So many times, a mobile user will accidentally send a document to the wrong printer, or get distracted by what the passenger next to them is doing on a plane, or even leave their device in the back seat of a cab. All of these potential threats are easy to protect against if you know what to look out for.
Internet of Things (IoT) devices utilize internet connectivity with embedded technology that allows them to be controlled remotely through computer interfaces giving rise to security vulnerabilities and challenges. With little to no serious security protection consideration given to this industry, security breaches of such devices have reached headline heights. Risk assessment and protection for companies and your home are critical.
October 08, 2018
Businesses Beware: Top 5 Cyber Security Risks
Hackers are working hard to find new ways to get your data. It’s not surprising that cyber security risk is top of mind for every risk owner, in every industry. As the frequency and complexity of malicious attacks persistently grows, every company should recognize that they are susceptible to an attack at any time—whether it comes as an external focused attack, or a social engineering attack. Let’s take a look at the top 5 risks that every risk owner should be preparing for.
April 09, 2019
Cyber Security: Three Parts Art, One Part Science
As I reflect upon my almost 40 years as a cyber security professional, I think of the many instances where the basic tenets of cyber security—those we think have common understanding—require a lot of additional explanation. For example, what is a vulnerability assessment? If five cyber professionals are sitting around a table discussing this question, you will end up with seven or eight answers. One will say that a vulnerability assessment is vulnerability scanning only.
April 03, 2018
Top 6 Ways Public Sector Agencies Can Fight Phishing
Phishing—or the practice of sending emails that appear to be legitimate in order to gain access to information as part of a scam—is a serious cyber security problem. According to CSO Online, 56% of IT professionals named phishing as their top cyber security threat. However, phishing attacks aren’t just targeted against businesses or individuals.
IT Security Solutions
Discover how Connection can help you create a security strategy that addresses your critical risks and protects your operations.
IT Security Services
Security is the responsibility of every user. Learn more about our Security Awareness Training as well as the other IT security services Connection offers that empower you to control your risk day after day.
Learn About Our Cyber Security Solutions.Our experts have helped thousands of customers transform technologies into IT solutions that deliver greater collaboration, efficiency, and security. Fill out the form below and we'll be in contact to discuss your assessment.