Supply Chain Risks: It’s Everybody’s Business

Posted on July 20, 2021 by Vito Nozza

There is an old saying that states, “Take care of your house and let others worry about theirs.” This might be valid in the pre-internet world, but with so many dependencies and relationships that have been created between partners and third-party suppliers, the “trust but verify” motto has become commonplace—or has it? Companies are only as strong as their weakest links. Creating a strong cybersecurity program internally is not enough, as the program should include all aspects of business in which data is vulnerable.

Read More

Securing Microsoft Azure Natively

Posted on June 22, 2021 by Martin Townend

Since its launch in 2010, Microsoft Azure has gained popularity and trust with customers on a global scale. Azure is a public cloud offering that provides solutions for Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). However, as with any cloud provider, there are concerns around security and breach issues (i.e., how safe is my data?), as the solutions are hosted in a cloud service provider (CSP) data center.

Read More

Active Exploitation of Vulnerabilities in Microsoft Exchange Server + Mitigation Guidance (CodeName: Hafnium)

Posted on March 11, 2021 by Joe Vigorito

Current Status of Hafnium

Coming on the heels of the still evolving SolarWinds data breach, it is now verified that four previously unknown or "zero-day" vulnerabilities in Microsoft Exchange Server are being used in widespread attacks against thousands of organizations, with many more potentially affected, according to security researchers.

Read More

21 Cybersecurity Tips for 2021 (Part 3)

Posted on February 23, 2021 by Joe Vigorito + Vito Nozza

In part one and part two of this blog series, we shared fourteen cybersecurity tips to prepare your organization for 2021. This blog post includes seven final tips to keep your organization safe in 2021.

Read More

21 Cybersecurity Tips for 2021 (Part 2)

Posted on January 19, 2021 by Joe Vigorito + Vito Nozza

In the previous installment of this blog series, we shared seven cybersecurity tips to prepare your organization for 2021. This blog post includes seven more tips to help protect your organization from cyber-attacks.

Read More

Multi-Cloud Data Protection

Posted on December 22, 2020 by Tony Ocampo

Organizations today have a multi-cloud presence. By that, I mean that on-premises data centers are no longer the standard in IT. Businesses require application mobility to meet the ever-increasing demand for data and information at light speeds, and thus it is very typical for an organization to have several deployments of multi-cloud data centers to fit these demands and needs. Software as a Service, Infrastructure as a Service, Unified Communications as a Service, Edge, and IoT Computing are just a few of the potential multi-cloud deployments, on top of the on-premises and co-located data centers in different regions and geo-locations. 

Read More

21 Cybersecurity Tips for 2021 (Part 1)

Posted on December 15, 2020 by Joe Vigorito + Vito Nozza

2020 has been a groundbreaking year on many fronts. Unfortunately, the majority of them have not been good ones. On October 28, 2020, the FBI, HHS, and CISA jointly reported on an imminent threat to healthcare organizations (the Health and Public Health Sector) surrounding the Ryuk variant of ransomware and other malware most recently seen accompanying it. “We are experiencing the most significant cybersecurity threat we’ve ever seen in the United States,” said Charles Carmakal, Chief Technical Officer of the cybersecurity firm Mandiant, in a statement.

Read More

Protecting Students with Safe Schools

Posted on October 20, 2020 by ConvergeOne

Campus Security

We ask our educators to do a lot. The threat of school violence on campus and from remote sources has district decision-makers needing answers. Risks need to be identified, with consideration given to protecting the student wherever they are. Security needs to be conducted in a way that doesn’t feel like a prison. What’s more, innovation with physical security provide new feature sets only possible on IP networks ⏤ meaning that IT teams now have partial or new responsibility for physical security. ConvergeOne coordinates a mix of digital applications to shield against/respond to threats and other hazards. Key areas of focus include:

Read More

ConvergeOne Thought Leaders Share What You Can Expect at Avaya ENGAGE 2019

Posted on January 8, 2019 by ConvergeOne

With Avaya ENGAGE quickly approaching, we decided to check in with ConvergeOne thought leaders—who will be presenting at 27 sessions during the event—to get a sense of what we can expect. These are the primary themes that emerged.

Read More

5 IT Security Questions You Should be Asking

Posted on July 16, 2018 by Tim Femister

Is your cyber risk management program properly protecting your critical information assets? If not, it may be time to evaluate your current approach. 
 
A simple way to assess the foundational elements of your cyber risk management program is to ask these five specific questions. Similar to an iceberg, these questions are simple at the surface, but beneath the surface, they help to understand your program.
 
Read More