PRESS RELEASE Contact: Kat Jimenez, Sales and Marketing Assistant firstname.lastname@example.org February 9, 2016 - The Navy Yard, Pennsylvania - Layer 8 Security presented at the inaugural Technology Leaders Forum hosted by Rittenhouse Ventures at their headquarters in Philadelphia. Chief Technology Officers and senior leaders within the Rittenhouse Ventures portfolio of companies attended the event to discuss the challenges and opportunities relating to technology. Following the theme of the forum, Layer 8 Security spoke about Data Security and covered the following [...]
Layer 8 Security is hosting a class with Precise about reducing the risk of cyber exposure for law firms at the offices of Expert Technology Associates. To register for the event, visit http://www.eventbrite.com/e/minimizing-the-risk-of-cyber-exposure-for-todays-law-firm-1-pa-ethics-cle-credit-tickets-18650999642. See below for details!
Layer 8 Security and managed security provider, eSentire, are hosting a networking reception at The Union League of Philadelphia. To register for the event, visit www2.esentire.com/UnionLeageOct21. See below for details!
Data breaches in 2014 made major headlines as large organizations such as Sony, Neiman Marcus and The Home Depot were compromised. 2015 has proven to be no different with BlueCross, Anthem and Ashley Madison joining the crowd. The biggest issue; however, is that the headlines only show the big fish, ones who can likely recover. What goes unnoticed are the other 1,400+ organizations who have been compromised in the past two years. This has led many C-Level executives of small [...]
I’ll give you a taste of the NIST Cybersecurity Framework Audit. This is question 4 of 99 asked in the CSF Audit: “ID.BE-4: Dependencies and critical functions for delivery of critical services are established” – In other words, what services do you need to operate your business, and oh by the way, which businesses out there rely on you to conduct their own business? So the third-party vendor vulnerability has become HUGE. This is the reason almost half of our [...]
If you haven't heard this before, then get ready to hear it a lot more now. While outsider threats can be and are a big deal, and obviously a major concern, one of the biggest areas of risk for ANY company is and will be it's internal resources. Put another way, you have to be as careful about those who you give access to, as you are with those who don't have access to your network and corporate resources. Just [...]
Layer 8 Security is pleased to announce its newly established partnership with Expert Technology Associates (ETA). ETA is an award winning provider of Business Communications, Cloud, and Connectivity Solutions. Layer 8 Security partnered with ETA to further enhance its expertise in providing in-depth information security analysis and consulting to clients around the country. While people are the first line of defense against information security attacks, the technology businesses rely on to operate must be configured and protected to best meet their strategic [...]
A warning to our clients and those concerned with the latest cybersecurity threats. The FBI has issued an Extortion email PSA stating that there has been an exponential jump in the number of extortion threats sent via email to businesses of all sizes. The threat involves the launching of DDoS attacks against a victim’s website unless or until a ransom is paid. This type of attack has been around for years, however they have recently grown in size, impact, and duration. DDoS (Distributed [...]
Information Security is evolving at an exponential rate. What cut it 10 years ago would make today’s cybersecurity analysts cringe. We will cover other aspects of keeping you safe from threats in future posts, but for now let’s focus on your physical hardware and more specifically encrypting your data. If your laptop is lost or stolen you are at risk of someone inserting a USB stick, booting an operating system (ie. Linux) and making your entire hard drive unencrypted and [...]
For those of us who perform any functions in cybersecurity, you know how much of a challenge it can be to strike a balance between needed levels of security and a happy customer base. The two are often at odds, considering that they are usually diametrically opposed. The CISO and his minions seek the utmost in security. Constantly changing passwords of a high complexity. Locked down VPN capabilities. Stringent standards for wireless networks. Strictly restricted device lists, in terms of [...]