threats

Home/Tag: threats

Layer 8 Security Presents at Rittenhouse Ventures’ Technology Leaders Forum

PRESS RELEASE Contact: Kat Jimenez, Sales and Marketing Assistant  kat.jimenez@layer8cybersecurity.com February 9, 2016 - The Navy Yard, Pennsylvania - Layer 8 Security presented at the inaugural Technology Leaders Forum hosted by Rittenhouse Ventures at their headquarters in Philadelphia. Chief Technology Officers and senior leaders within the Rittenhouse Ventures portfolio of companies attended the event to discuss the challenges and opportunities relating to technology. Following the theme of the forum, Layer 8 Security spoke about Data Security and covered the following [...]

CLE Credit Class – Minimizing the Risk of Cyber Exposure for Today’s Law Firm

Layer 8 Security is hosting a class with Precise about reducing the risk of cyber exposure for law firms at the offices of Expert Technology Associates. To register for the event, visit http://www.eventbrite.com/e/minimizing-the-risk-of-cyber-exposure-for-todays-law-firm-1-pa-ethics-cle-credit-tickets-18650999642. See below for details!

Networking Reception at The Union League of Philadelphia – October 21, 2015

Layer 8 Security and managed security provider, eSentire, are hosting a networking reception at The Union League of Philadelphia. To register for the event, visit www2.esentire.com/UnionLeageOct21. See below for details!

The Cost of Data Breaches Continue to Rise

Data breaches in 2014 made major headlines as large organizations such as Sony, Neiman Marcus and The Home Depot were compromised. 2015 has proven to be no different with BlueCross, Anthem and Ashley Madison joining the crowd. The biggest issue; however, is that the headlines only show the big fish, ones who can likely recover. What goes unnoticed are the other 1,400+ organizations who have been compromised in the past two years. This has led many C-Level executives of small [...]

Supply Chain Management is Not Secure By Any Standard…but there’s hope!

I’ll give you a taste of the NIST Cybersecurity Framework Audit. This is question 4 of 99 asked in the CSF Audit: “ID.BE-4: Dependencies and critical functions for delivery of critical services are established” – In other words, what services do you need to operate your business, and oh by the way, which businesses out there rely on you to conduct their own business? So the third-party vendor vulnerability has become HUGE. This is the reason almost half of our [...]

A Reminder On The Danger Of An Inside Job

If you haven't heard this before, then get ready to hear it a lot more now. While outsider threats can be and are a big deal, and obviously a major concern, one of the biggest areas of risk for ANY company is and will be it's internal resources. Put another way, you have to be as careful about those who you give access to, as you are with those who don't have access to your network and corporate resources. Just [...]

Layer 8 Security and Expert Technology Associates – A New Partnership

Layer 8 Security is pleased to announce its newly established partnership with Expert Technology Associates (ETA). ETA is an award winning provider of Business Communications, Cloud, and Connectivity Solutions. Layer 8 Security partnered with ETA to further enhance its expertise in providing in-depth information security analysis and consulting to clients around the country. While people are the first line of defense against information security attacks, the technology businesses rely on to operate must be configured and protected to best meet their strategic [...]

New E-mail Extortion Campaigns Threatening DDoS Attacks

A warning to our clients and those concerned with the latest cybersecurity threats.  The FBI has issued an Extortion email PSA stating that there has been an exponential jump in the number of extortion threats sent via email to businesses of all sizes.  The threat involves the launching of DDoS attacks against a victim’s website unless or until a ransom is paid. This type of attack has been around for years, however they have recently grown in size, impact, and duration.  DDoS (Distributed [...]

Encryption for Everyone: Part 1 OS X

Information Security is evolving at an exponential rate.  What cut it 10 years ago would make today’s cybersecurity analysts cringe.  We will cover other aspects of keeping you safe from threats in future posts, but for now let’s focus on your physical hardware and more specifically encrypting your data.  If your laptop is lost or stolen you are at risk of someone inserting a USB stick, booting an operating system (ie. Linux)  and making your entire hard drive unencrypted and [...]

Balancing Security And Customer Satisfaction

For those of us who perform any functions in cybersecurity, you know how much of a challenge it can be to strike a balance between needed levels of security and a happy customer base. The two are often at odds, considering that they are usually diametrically opposed. The CISO and his minions seek the utmost in security. Constantly changing passwords of a high complexity. Locked down VPN capabilities. Stringent standards for wireless networks. Strictly restricted device lists, in terms of [...]