ConvergeOne Thought Leaders Share What You Can Expect at Avaya ENGAGE 2019

Posted on January 8, 2019 by ConvergeOne

With Avaya ENGAGE quickly approaching, we decided to check in with ConvergeOne thought leaders—who will be presenting at 27 sessions during the event—to get a sense of what we can expect. These are the primary themes that emerged.

Read More

5 IT Security Questions You Should be Asking

Posted on July 16, 2018 by Tim Femister

Is your cyber risk management program properly protecting your critical information assets? If not, it may be time to evaluate your current approach. 
A simple way to assess the foundational elements of your cyber risk management program is to ask these five specific questions. Similar to an iceberg, these questions are simple at the surface, but beneath the surface, they help to understand your program.
Read More

How to Accelerate Your GDPR Program to Ensure Compliance

Posted on June 8, 2018 by Emily Dann

The enforcement period for the General Data Protection Regulation (GDPR) began on May 25, 2018, bringing significant changes to organizations in the European Union and beyond. Though a piece of European legislation, the GDPR impacts any organization that processes the personal data of those who reside in the Union, regardless of geographic location.

Read More

What You Need to Know About VPNFilter

Posted on June 1, 2018 by Tim Femister

VPNFilter Infects 500K Networking Devices + Growing

Over the course of the last several months, researchers have investigated an advanced persistent threat known as VPNFilter, which has already infected 500,000 devices across 50+ countries, specifically targeting home office networks (or places utilizing small office and home office devices) as well as network-access storage (NAS) devices. The threat is believed to be sponsored by or affiliated with a nation state, which generally leads to well-funded, well-executed persistent threats that are properly managed with a defined end-game.

Based on research recently released by Cisco Talos, the US Department of Justice is urging anyone who owns small office home office (SOHO) and NAS devices to reboot their devices immediately. 

The VPNFilter malware operates via three unique stages, which are described below at a high level.

Read More

Blockchain for Simple People (Like Me)

Posted on May 17, 2018 by Andrew Prokop

"Whoever is careless with the truth in small matters cannot be trusted with important matters."

—Albert Einstein

We’ve all heard the old saying, “Be careful of the company you keep.” This is true for both people and technology. Consider blockchain. For many Americans, the immediate word association is “Bitcoin.” In fact, I would venture to guess that quite a few people think that they are one and the same. While this connection might be favorable for Bitcoin, it has become a bit of a boat anchor for blockchain. 

Read More

Under Armour, Hudson Bay, and Panera: 10 Lessons Learned from their Data Breaches

Posted on April 9, 2018 by Joe Vigorito

It has been a tough couple of weeks for the retail and restaurant industries. Under Armour, Panera, and Hudson Bay all came forward to announce major breaches of data entrusted to them. 

What can we learn from this continuing cavalcade of data breaches that we are becoming more and more inured to as time goes on? Let's take a closer look.

Read More

How to Protect Against Meltdown + Spectre Security Flaws

Posted on February 2, 2018 by Collin Buechler

If you listen to the news reporting on Meltdown and Spectre you would have no doubt in your mind that these issues must be addressed immediately. According to most reports, the Meltdown and Spectre vulnerabilities have shaken everyone’s fundamental trust in technology.

They impact nearly every piece of computer and communications technology manufactured in the past 20 years, including laptops, mobile phones, tablets, computers and smart refrigerators. They represent a clear and present danger to your data and the integrity of your system security, but let’s take a deep breath and understand what is the real risk.

Understanding the scope and impact of a threat is key to understanding how to mitigate the risk.

Read More