Blog

14
Nov

What You Need to Know About Bot-driven Attacks This Holiday Season

Excited for the holidays to get underway? So are hackers. Online retail transactions are 10 times more likely to be fraudulent than even those of the financial services sector, according to the Threat Metrix Q1 2018 Cybercrime Report. With the busiest shopping season of the year less than a week away, cybercriminals are taking every advantage with bot-driven attacks, one of the most dangerous threats of today. Ecommerce companies are currently the prime target, but do not fool yourself into...

Read more

4
Oct

4 Action Items for National Cyber Security Awareness Month

From election interference allegations and natural disasters to topics like cloud-service misconfigurations and API vulnerabilities the industry has been experiencing over the last couple of months, no one is immune to data breaches. Your systems and data are a constant target for hackers on the hunt. In fact, according to the Verizon 2018 Data Breach Investigation Report, a whopping 58% of cyber-attack victims were classified as small businesses. As part of this October’s National Cyber...

Read more

7
Sep

Top 4 Cybersecurity Tips for Successful Cloud Computing

The security hits keep coming from all directions, and misconfigurations in third-party Application Programming Interfaces (API) are quickly becoming one of the fastest-growing vulnerabilities for malicious activity. These kinds of problems reinforce just how critical it is to never assume Software as a Service (SaaS) or cloud service providers have the proper security in place to protect your information. In order to fully grasp the magnitude of how dangerous these threats are, it is important...

Read more

8
Aug

The 1 Thing You Need Most When Converting to the Cloud

In today’s cyber-threat landscape, there is no room for human error when setting up your cloud systems. Whether you have an internal IT team or an outside service provider, cloud conversion isn’t something just anyone can do. The latest misconfiguration mishaps with Amazon Web Services (AWS) Server buckets being set to allow anyone in the public to access confidential information is nothing short of an invitation for malicious activity. These completely avoidable mistakes underline the...

Read more

10
May

3 Tactics to Boost Your Confidence in Adopting New Technologies

Adopting new technologies is crucial to business growth; yet, worries about how to properly secure it are keeping small and medium-sized business owners from making this important investment, according to a recent Forrester Research study commissioned by the Columbus Collaboratory. In fact, 56% of business owners surveyed indicated that securing hybrid cloud technology caused them high or very high anxiety. This lack of confidence often leads to other issues, such as slow or unfinished...

Read more

6
Mar

How to Prepare for GDPR – A CISO’s Perspective

The General Data Privacy Regulation (GDPR) will come into force on May 25, 2018. This regulation requires companies in all countries who perform payment-card transactions with any citizen of the European Union (EU) to maintain a stringent plan that protects their personal data and privacy. Without the required security tools, controls and documentation in place, failure to comply with GDPR could potentially cost you millions. That’s where Protelligent®, in partnership with AlienVault®, can...

Read more

13
Feb

What You Need to Know about PCI DSS 3.2

The Payment Card Industry Data Security Standard (PCI DSS) published by the Payment Card Industry Security Standards Council (PCS SSC) is a set of regulations businesses must use to safeguard the financial and personal data of their customers throughout every point of a transaction. In response to the increase in payment information threats, version 3.2 of the PCI DSS is in full effect. PCI DSS is now recognized as a standard that can be updated with small revisions, rather than only when...

Read more

29
Jan

Protelligent Ensures Compliance with Duo Security

Duo Security knows security and compliance are crucial to ensuring the success of their customers. Their security expertise includes compliance, two-factor authentication and endpoint remediation that provides their customers with the tools they need to ensure they adhere to the latest in compliance standards. Protelligent® recognizes the importance of ensuring compliance, and has chosen to partner with Duo Security to provide solutions to our customers. Through Protelligent’s use of Duo...

Read more

2
Jan

2 Critical Factors to Building a Strong Security Program for Your SMB

Cyber threats are increasing at an alarming rate, which means it is only a matter of time before your business will have to investigate some sort of an attack. With more than 60% of businesses closing their doors within six months of a breach, threat knowledge and proactive strategies are vital to reducing your risk. Here are two key factors in developing an effective cybersecurity program for 2018.

Read more

15
Dec

Protelligent Delivers Unified Security Solutions with AlienVault Technology

AlienVault™ recognizes the importance of providing their customers with best-in-class threat detection and response. Their security tools are combined into simplified packages and are fully functional from the moment of setup. Their dedication to providing world-class security solutions to businesses of all sizes is one of the many reasons Protelligent® has chosen to partner with AlienVault. As the processes and methods of cyber criminals continue to grow and evolve, utilizing continuous...

Read more