Supply Chain Risks: It’s Everybody’s Business

Posted on July 20, 2021 by Vito Nozza

There is an old saying that states, “Take care of your house and let others worry about theirs.” This might be valid in the pre-internet world, but with so many dependencies and relationships that have been created between partners and third-party suppliers, the “trust but verify” motto has become commonplace—or has it? Companies are only as strong as their weakest links. Creating a strong cybersecurity program internally is not enough, as the program should include all aspects of business in which data is vulnerable.

Read More

Lessons From a Survivor of Ransomware

Posted on June 3, 2021 by Stephan George

I can remember the moment clearly: I was in an early-morning meeting with several of my employees. Several minutes into the meeting, my mobile phone came to life with notifications and a call. Shortly after answering, there was a knock at the door. Almost instantly, I did not feel so well; I knew this couldn’t be good. As if it were rehearsed for stereo effect, I heard the words no one ever wants to hear: “I think we’ve been hacked.” My first response was, “Not possible!” Turns out, it was very possible and very much a reality. To be fully transparent, I thought my life and professional career were over in that moment; 25 years down the drain just like that! I took the cyberattack very personal.

As an Executive Director at one of the largest school districts in my state, I had officially become the next victim of ransomware.

Read More

Securing Your AWS Environment Cloud Natively

Posted on May 25, 2021 by Martin Townend

Since the shift from the concept of traditional IT to the public cloud, there have been many new security services and cloud-native tools being implemented across all vertical industries to protect and govern the customer cloud environment. Cloud computing is evolving at an ever-increasing rate of change, but regulations and technology have not been keeping the same pace. Businesses trust the AWS cloud to secure their infrastructure so they can grow and evolve by accelerating innovation.

Read More

Ransomware Protection for Your Virtual, Physical, and Unstructured Data

Posted on May 20, 2021 by Eric Jansta

The continuing evolution of ransomware attacks requires innovative, protective solutions. Dell has led the protection of the data center with the Cyber Recovery solution, which is the only solution certified by Sheltered Harbor. It implements a digital air-gap solution that provides a dedicated replica isolated from the production environment. The isolation limits risks associated with remote threats identifying, accessing, and corrupting the backup data. In order to identify when a ransomware attack has occurred, Dell has partnered with Index Engines to monitor the backup data stream. CyberSense from Index Engines uses machine learning to identify changes in the backup data and alert when the appearance of an attack occurs.

Read More

Microsoft Exchange Server Security Update

Posted on May 5, 2021 by ConvergeOne

Microsoft has issued an Exchange Server Security Update on April 13, 2021 for companies with an on-premises deployment of Microsoft Exchange Server 2013, 2016 and 2019. This affects both on-premises and hybrid deployments of Exchange Online. Exchange Hybrid users are less affected. However, the FBI’s recommendation is to patch this vulnerability as soon as possible.

Read More

One Step Ahead: Fraud, COVID, and the Contact Center

Posted on March 16, 2021 by Kathy Sobus + LumenVox

This blog post was co-authored by Kathy Sobus (Senior Director, Customer Experience Strategy, ConvergeOne) and LumenVox.

Read More

Active Exploitation of Vulnerabilities in Microsoft Exchange Server + Mitigation Guidance (CodeName: Hafnium)

Posted on March 11, 2021 by Joe Vigorito

Current Status of Hafnium

Coming on the heels of the still evolving SolarWinds data breach, it is now verified that four previously unknown or "zero-day" vulnerabilities in Microsoft Exchange Server are being used in widespread attacks against thousands of organizations, with many more potentially affected, according to security researchers.

Read More

21 Cybersecurity Tips for 2021 (Part 3)

Posted on February 23, 2021 by Joe Vigorito + Vito Nozza

In part one and part two of this blog series, we shared fourteen cybersecurity tips to prepare your organization for 2021. This blog post includes seven final tips to keep your organization safe in 2021.

Read More

Introducing a Game-Changing Fraud + Authentication Strategy

Posted on February 2, 2021 by Kathy Sobus + LumenVox

This blog post was co-authored by Kathy Sobus (Senior Director, Customer Experience Strategy, ConvergeOne) and LumenVox.

Read More

Today’s Data Privacy Day. Are you in control of your information?

Posted on January 28, 2021 by Vito Nozza

As today is Data Privacy Day, it is only fitting that we discuss your data and understand the rights you have when sharing that information. How many of you have used Google? Apple? Facebook? Amazon? Within the last day? Did you know what you were agreeing to when you quickly scrolled down to the accept their terms of service boxes? How about when you accept the numerous cookies that pop up on seemingly every website that you visit? Do you know what these “accept” actions have given companies permission to do?

Read More