Blogs

Leveraging VNSOC360° Managed Security Services for Federal Compliance

Mar
13

If you have been in IT or Security Operations long enough, you’ve come across that environment or product that you have to deal with on a day-to-day basis that has you pulling your hair out…

Posted By Jason Shropshire read more

Day in the life of a VNSOC360° Cyber Security Analyst -- Insider Threats

Mar
05

Don Codling, former Unit Chief of the FBI Cyber Division, said “One of the biggest cyber security challenges for business is that there is no patch for careless, greedy or stupid”. Often companies and small businesses have a false reliance on anti-virus and a lack of manpower letting internal threats and attacks run continually unnoticed.

Posted By Gary Daemer read more

Business-friendly Security

Mar
02

Security becomes an adversary to your organization when it hinders the operation of key business functions. There are no two ways about it. And the smooth operation of revenue-producing business process trumps the needs of a security program every time.

Posted By Adam Byers read more

DFARS and NIST 800-171...Why are they important?

Jan
13

For covered contractor information systems that are not part of an IT service or system operated on behalf of the Government . . . the following security requirements apply:

Posted By Stephen Simchak read more

Resetting the enable password on a Force10 S50N switch

Sep
23

Googling around for a solution to this one and you'll find many. Over time these have changed based on the boot code and FTOS version so many will no longer work. We ran into this yesterday, and I came across this post that I remember using before to set a switch back to factory defaults. The initial steps 1 through 5 did not work for us, but we were able to get the switch defaulted by breaking out of the boot cycle when the image was loading.

Posted By Jason Shropshire read more

6 Essential Questions for Small to Midsize Businesses (SMB) to ask, that will Improve Their Security Posture

Aug
02

There are two types of Small to Midsize Businesses (SMB) in today’s world: those who know they have been breached, and those who do not. The difference between these types of SMBs is related to how soon the SMB can detect a breach and how effectively they can respond.

Posted By Gary Daemer read more

You are under attack right now…but how would you know…are you watching?

Jul
25

If you are connected to the internet, you are under attack right now…Are you monitoring or watching your IT ecosystem, if you are not how would you know? Most small to midsize businesses (SMB’s) are not watching their IT ecosystem. They install a firewall and put virus protection on their endpoints and truly believe they are secure enough. On average, it takes 205 days to discover that a breach has occurred…Normally it is a third party who discovers the breach.

Posted By Gary Daemer read more

What you see is what you get with Small Business Security Culture

Jul
08

As a small business owner myself, I truly understand the everyday challenges we face, Payroll, Human Resources, Service Delivery, New Business, Equipment Maintenance…Cyber Security is often over looked because of a real lack of a Security Culture in the business. Therefore, Small and Medium Business (SMB) will not Commit Resources to address the true risk of doing business in today’s world of Hackers, Activists, Nation States, Terrorist and Rouge Employees.

Posted By Gary Daemer read more

Why the Telecommunication Industry needs to take advantage of the NIST Cybersecurity Framework

Jul
05

Advancing cybersecurity across the internet infrastructure has long been a priority for InfusionPoints. Current defense paradigms are archaic, introducing inefficiencies while missing a holistic view. A lack of skilled resources, budget constraints and tactical approaches have led to a haphazardly assembled strategy and a hodgepodge of solutions leading to a weakened security posture. Seeing this, President Obama issued Executive Order (EO) 13636—Improving Critical Infrastructure Cybersecurity—in February 2013.

Posted By Gary Daemer read more

Small and Mid-Sized Businesses need to focus their security spending on tactical and strategic controls….

Jun
25

For several decades now, business have been transformed by technology. However, small to midsize businesses (SMB) were at a disadvantage competing against a bevy of larger, more financially and technically stronger companies. Now, with the rapid advancement of service enabled cloud providers and mobile technologies these SMB’s are transforming their business rapidly. The economy has made the shift to an affordable internet-based ecosystem, which has leveled the field of competition. This new internet-based ecosystem offers tremendous opportunities for SMBs.

Posted By Gary Daemer read more

Pages

Subscribe to RSS - blogs

InfusionPoints, Your Independent Trusted Advisor

We founded InfusionPoints to be our clients' first choice for an independent trusted partner to build secure systems that protect their employee's, partner's and customer's data