<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1856953457853813&amp;ev=PageView&amp;noscript=1">

VLCM IT Industry News

2FA, Just Do It!

Posted by Dan Schuyler on Jul 16, 2018 12:23:53 PM

The number of credential harvesting breaches that could have been prevented by enabling two-factor authentication (2FA) is staggering. Verizon’s 2017 Data Breach Investigation report indicates that 81% of hacking-related breaches leveraged either stolen and/or weak passwords. Yet less than 10% of Gmail users enable two factor authentication and less than one-third of people use 2FA. For companies that are required to comply with PCI, HIPAA, GDPR, etc. enabling 2FA could mean the difference between a failed hacking attempt or being subjected to substantial fines and penalties.

Read More

Topics: IT Security, Cybersecurity

Cybersecurity Awareness Month

Posted by VLCM on Oct 2, 2017 9:17:00 AM

Just when you think it is safe, another global hack hits the headlines, and the cycle of frustration and worry begins anew. Are my systems safe? What would I do if our data was compromised? Is my IT prepared for a full-scale hacker attack? 

If you care about your business, you’re asking yourself these questions. And you should be. 

Read More

Topics: IT Security, Cybersecurity

Be ProActive Throughout the Cyber Kill Chain

Posted by VLCM on Aug 28, 2017 8:17:00 AM

Too often, a company’s approach to cyber security is reactive, with the IT support team focusing on vulnerabilities and improving security systems after an incident has occurred. It’s an ineffective method and leaves the organization susceptible to further attacks. 

Taking a proactive, network wide cyber security approach allows the organization to pull together plans, policies, and tools to better anticipate and prevent cyber attacks from happening or mitigating them before damage is done. The first step in putting together a proactive approach is to take steps to truly understand the steps of the cyber kill chain.  

Read More

Topics: IT Information, IT Security, Cybersecurity

Post-Petya Ransomware Predictions

Posted by VLCM on Jul 25, 2017 9:13:00 AM

The results are in: 2016 was a dismal year for victims of ransomware:

And now for the bad news; we’re only halfway through 2017 and things look even bleaker.

Nowadays, threats are harder to detect, automated attacks make everyone a target, and vulnerable devices are everywhere. Just when you think you’ve got everything figured out, sophisticated criminals are taking old threats and beefing them up with new technologies.

The recent Petya panic that came right on the heels of Wannacry is a reminder that when it comes to ransomware, you can never let your guard down.

Read More

Topics: IT Security, Ransomware

SDN Security, Simplified

Posted by VLCM on Jul 5, 2017 10:23:00 AM


Mobile devices and the move to server virtualization and cloud services are in part driving the need for nimble architecture like software-defined networking (SDN). This is more than buzz; it is a watershed phenomenon. Analyst firm International Data Corporation (IDC) predicted that SDN as a global market will grow to $12.5 billion by 2020.

Read More

Topics: Product News, IT Security, Network, SDN

The Secret to Successful Wi-Fi Access Security

Posted by VLCM on May 31, 2017 8:34:03 AM

By 2020, it is expected that more than 38 billion devices will be connected to the Internet, many of them mobile devices that rely on wireless access. Just as network boundaries are being stretched in multiple directions by the Internet of Things (IoT) and mobility, threats are becoming more complex and hackers more sophisticated than ever.

Read More

Topics: IT Security

3 Signs Your Endpoints Are At Risk

Posted by VLCM on Mar 14, 2017 4:28:23 PM

While the ongoing drive towards digital transformation provides new opportunities for business growth, it can also make companies more vulnerable to cyber risks. Technology trends such as the cloud, IoT and BYOD have dramatically upped the number of endpoints open to exploitation by cyber criminals.

Read More

Topics: IT Security

Tips to Instilling Smart Cyber Hygiene Habits in Your Workforce

Posted by VLCM on Mar 9, 2017 9:22:44 AM

Security breaches are inevitable. But that doesn’t make the facts any less daunting:

Read More

Topics: IT Security

The Problem with Your “Next-Generation” Firewall

Posted by VLCM on Feb 21, 2017 1:56:50 PM

With cybersecurity experts predicting a rise in sophisticated cybercrime such as ransomware attacks, distributed denial of service (DDoS) attacks and advanced persistent threats (APTs), organizations need to ensure their networks are properly protected. For more than 17 years, next-generation firewalls have been the solution of choice on account of their strong network perimeter protection capabilities and high network security processing power. But with the rise of the borderless enterprise, it’s now necessary to move away from perimeter-centric solutions and opt instead for more comprehensive protection.

Read More

Topics: IT Security

Are You at Risk for Cyber Attacks? A Cyber Threat Assessment Will Help

Posted by Utah Business on Aug 11, 2016 9:27:52 AM

You cannot open the newspaper or turn on television news without seeing a report of a cyber security breach in the United States. These attacks are costly and they impact everyone from restaurants to medical offices to retailers and government.

Read More

Topics: IT Security