Industry Insights

Biggest Threat to Enterprise CyberSecurity - Third-Party Remote ...

Posted by Don Rudolph on Mar 14, 2018 8:25:00 AM

In the era of Bring Your Own Device and distributed virtual teams, remote access to sensitive network resources is quickly emerging as the biggest internal cybersecurity threat.

As more of the workplace moves online and team members require flexible access to IT assets from around the world, remote access has become a major headache for system administrators.

Read More

Topics: Data Breach, IT Security, vulnerabilities, vCISO, threat assessment, cybersecurity, enterprise security, Third-Party Vendor Access, Virtual Chief Information Security Officer, Remote Access, granular permissions, audit trail

What Is a Cyber Security Risk Assessment and Why Do One?

Posted by David Cahoon on Mar 6, 2018 9:38:39 AM

Cybersecurity is one of the most important ongoing business concerns for any enterprise.

Major security risks are not limited to the Fortune 500. On the contrary, small and mid-sized businesses are often completely wiped out by the repercussions of a network breach.

Read More

Topics: Ransomware, Compliance, Risk Assessment, Network Vulnerabilities, cybersecurity, enterprise security, Network Breach, sensitive financial and healthcare information, calculating ROI in cybersecurity, Optimize Security Investments, Manage Threats, Security Training

10 Cybersecurity Myths That Every Organization Should Know

Posted by Don Rudolph on Mar 2, 2018 9:40:46 AM

For businesses around the world – but particularly those based in the United States – the threat environment in IT has never been more complex. Unfortunately, many businesses build their IT security practices on received wisdom: Assumptions that simply don’t hold up in practice.

Read More

Topics: Information Security, cyber strategy, nca security services, vCISO, cybersecurity

New Vulnerabilities Spectre and Meltdown

Posted by Don Rudolph on Jan 8, 2018 2:12:29 PM

New vulnerabilities Spectre and Meltdown.jpgTwo new and related security vulnerabilities called “Spectre” and “Meltdown” are significant because they affect computing platforms with Intel, AMD, or ARM central processing units (CPU’s). This includes Mac, Windows, Linux, Android and other platforms. These vulnerabilities take advantage of the ability to extract information from instructions that have been executed on a CPU using the CPU cache as a side-channel.

Read More

Topics: Network Security Solutions, vCISO, Network Vulnerabilities

Increase Network Security with Better Threat Visibility

Posted by RSA Security on Dec 13, 2017 1:19:00 PM

Cybersecurity should be a priority for any organization. With a new cyberattack launched every 39 seconds, there is little hope for any organization to fly under the radar, no matter how small it is.

Read More

Topics: Network Security, Network Visability, RSA Security

Building a Business-Driven Security™ Strategy

Posted by RSA Security on Dec 7, 2017 12:27:38 PM

Building a Business-Driven Security™ Strategy

Today, a disconnect exists between management and IT departments that exacerbate the multi-billion dollar losses and cybersecurity expenses in which businesses incur every year. This misalignment stems from a traditional siloed approach to cybersecurity: Management orchestrates the daily operations of the company while the security team focuses on cyberthreats. This results in what RSA calls a "gap of grief," which impairs an organization's ability to mitigate and defend from threats. RSA outlines several key steps to bridge this gap by transforming a disconnected approach into a business-driven security™ strategy.

Read More

Top reasons for out-sourcing desktop support: Personnel Factor

Posted by David Smith on Nov 16, 2017 8:03:00 AM

If you’re considering outsourcing your desktop and laptop support, your company has a lot to gain and nothing to lose – if you choose the right partner. Through a custom support outsourcing strategy, you can make your enterprise more lean and efficient than ever.

You’ve read about the benefits in morale and technology performance that end users can enjoy through outsourcing. Now, consider this: It can make your enterprise more agile and cost-effective, simplifying personnel matters in myriad ways.

Read More

Topics: Managed IT Services, Outsourced Security, Desktop Support, outsourced desktop services, 24x7x365 support

The Digital Transformation Journey

Posted by Thomas Gobeille on Nov 14, 2017 2:16:23 PM

To our community of interested parties and clients,

I am delighted to present another update with the intention to keep you informed as Mitel and ShoreTel’s combined integration continues to march forward.  The senior management team finds little overlap between the two companies and still considers it accretive in growth for the value to both clients and shareholders.

As I stated in my last post, Mitel is now the #2 player in the emerging global UCaaS market powering more than 2 billion connections and growing.

Read More

Topics: ShoreTel, ShoreTel Connect Cloud, Mitel, UCaaS, Secure Collaboration

Top reasons for out-sourcing desktop support: Security

Posted by David Smith on Nov 9, 2017 10:25:03 AM

Information security is now a key concern for all enterprise technology decisions. It’s no surprise that, when considering options for outsourced support, security is one of the main roadblocks to implementation. NCA’s outsourced support offerings address security and performance issues in a single package, hardening your data resources against all kinds of threats.

Read More

Topics: Managed IT Services, Network Security Solutions, 24x7x365 support

Recent Bad Rabbit Ransomware - Palo Alto Networks Prevention

Posted by Kelly Keeton on Nov 3, 2017 2:06:19 PM

Please make sure your policies are configured with threat prevention, using file blocking and wildfire to prevent this attack. If you’re unsure about your policies or would like a policy assessment, please reach out to NCA and we can schedule time for to review the policies and go through a best practices report. This report will look at your current policy usage, and the recommended changes in order to prevent Bad Rabbit and other threats.

Read More

Topics: Bad Rabbit Ransomware, Palo Alto Networks

Subscribe to Email Updates

Lists by Topic

see all