Backups are like flood insurance — one of those things you dont normally think about or act on, but its an absolute crisis when you havent prepared for computer problems or when the river rises. Data loss can occur for many reasons: hardware failure (disk crash), viruses, user error, or even being stolen via a hack.
Blog
-
The CIA Triad of Information Security
When people think about information security awareness, theyre usually focused on preventing hackers from stealing sensitive information such as their social security or drivers license numbers. While keeping that information out of criminals hands is vitally important, its only one leg of the CIA Infosec Triangle.
-
Default is the Enemy & Backups are your Friend
There was a time not so long ago that any time one needed a Wi-Fi signal, we had our pick of networks to join. By our count, approximately 5% of available SOHO (Small Office, Home Office) networks were entirely unsecured / lacked a password! Then, seemingly almost overnight, it was nearly impossible to find an unsecured, open WiFi network.
-
1:1 Cybersecurity Solutions
RSI Helps Broker Dealers and Financial Advisors Address FINRA Cybersecurity Checklist and Mitigate Cybersecurity Risk.
In a months time broker dealer firms from around the country will descend upon Washington DC to attend the FINRA 2017 conference. Given evolving threat environments and continuing challenges of Cybersecurity controls (per FINRAs 2017 Priorities list) its certain that Cyber threats and mitigation efforts will be hot topics addressed within the keynotes and workshops scheduled throughout the week.
FINRAs Cybersecurity checklist is an excellent resource to assist companies looking to establish or augment an existing Cybersecurity program. Whether youre ready to deploy a solution or need to scope out your requirements, we recommend these due diligence steps in picking a Cybersecurity vendor.
-

Firewall Essentials – Hardware vs. Software Firewalls
If the main entry to your house is protected by your front door, your computer network is protected by a firewall — a term that originally hails from the automotive industry. In a car, a firewall is a metal barrier that separates the engine compartment from passengers, thus protecting us if a fire ignites in the engine. In the same manner, an electronic firewall is placed between the internet and your network to protect / shield your system infrastructure from the conflagration an intrusion could produce.
-

Why Paraphrases Prevent Password Hacking
We all think our passwords are more or less secure. We use multiple variations or letters, numbers and symbols and change them on a regular basis. We keep passwords carefully hidden on a spreadsheet or Post-it notes, all to keep cybercriminals from getting into our business. But the fact is, over 80 percent of all data breaches today are still password-related.
-

Is Your Company Being Scouted for a Cyber Attack?
The harsh reality for most cybersecurity professionals is that even the best cyber defenses still contain the element of human error. Despite the best intentions of IT departments and cybersecurity professionals, hackers still find ways to breach and penetrate defenses. And by conducting reconnaissance, cybercriminals can pinpoint which individuals might be the weakest link in the chain.
-

Encryption 101
History shows that societies with the best cryptography dominate the world. From the ancient Persians, to Germany, to England and the USA, there is at least a strong correlation between the robustness of a societys information security and their resultant global influence & success.
But what does that mean for you and your business? Are you aware that you probably use (or should use) encryption every single day? Data stored on your PCs hard drive is considered at rest – residing in one physical location for most of the time.