Blog

10
Jan

The Most Important Small Business Checklist of the Year

As you begin to establish goals and reevaluate critical business risks for the year ahead, cybersecurity must be at the very top of your list. According to the Breach Level Index, the number of lost, stolen or compromised records increased by a jaw-dropping 133% in the first half of 2018 compared to the same time the previous year. As attack methods continue to evolve, you not only need a strong security platform, but the knowledge and experience to put it all together. Without the right...

Read more

13
Dec

7 Lesser-Known Security Tips for Your New Device

Hoping to find a new laptop, tablet, smartphone or other device under the tree? Every time you use technology, whether at work or at home, you are sharing personal identifiable information (PII). With any new device, you must take precautions to ensure safe processing and storage of this data. Without a proactive-security approach to defend against hackers and identity thieves, you are setting yourself up for an unhappy 2019. Antivirus software, using strong passwords and changing them...

Read more

14
Nov

What You Need to Know About Bot-driven Attacks This Holiday Season

Excited for the holidays to get underway? So are hackers. Online retail transactions are 10 times more likely to be fraudulent than even those of the financial services sector, according to the Threat Metrix Q1 2018 Cybercrime Report. With the busiest shopping season of the year less than a week away, cybercriminals are taking every advantage with bot-driven attacks, one of the most dangerous threats of today. Ecommerce companies are currently the prime target, but do not fool yourself into...

Read more

4
Oct

4 Action Items for National Cyber Security Awareness Month

From election interference allegations and natural disasters to topics like cloud-service misconfigurations and API vulnerabilities the industry has been experiencing over the last couple of months, no one is immune to data breaches. Your systems and data are a constant target for hackers on the hunt. In fact, according to the Verizon 2018 Data Breach Investigation Report, a whopping 58% of cyber-attack victims were classified as small businesses. As part of this October’s National Cyber...

Read more

7
Sep

Top 4 Cybersecurity Tips for Successful Cloud Computing

The security hits keep coming from all directions, and misconfigurations in third-party Application Programming Interfaces (API) are quickly becoming one of the fastest-growing vulnerabilities for malicious activity. These kinds of problems reinforce just how critical it is to never assume Software as a Service (SaaS) or cloud service providers have the proper security in place to protect your information. In order to fully grasp the magnitude of how dangerous these threats are, it is important...

Read more

8
Aug

The 1 Thing You Need Most When Converting to the Cloud

In today’s cyber-threat landscape, there is no room for human error when setting up your cloud systems. Whether you have an internal IT team or an outside service provider, cloud conversion isn’t something just anyone can do. The latest misconfiguration mishaps with Amazon Web Services (AWS) Server buckets being set to allow anyone in the public to access confidential information is nothing short of an invitation for malicious activity. These completely avoidable mistakes underline the...

Read more

10
May

3 Tactics to Boost Your Confidence in Adopting New Technologies

Adopting new technologies is crucial to business growth; yet, worries about how to properly secure it are keeping small and medium-sized business owners from making this important investment, according to a recent Forrester Research study commissioned by the Columbus Collaboratory. In fact, 56% of business owners surveyed indicated that securing hybrid cloud technology caused them high or very high anxiety. This lack of confidence often leads to other issues, such as slow or unfinished...

Read more

6
Mar

How to Prepare for GDPR – A CISO’s Perspective

The General Data Privacy Regulation (GDPR) will come into force on May 25, 2018. This regulation requires companies in all countries who perform payment-card transactions with any citizen of the European Union (EU) to maintain a stringent plan that protects their personal data and privacy. Without the required security tools, controls and documentation in place, failure to comply with GDPR could potentially cost you millions. That’s where Protelligent®, in partnership with AlienVault®, can...

Read more

13
Feb

What You Need to Know about PCI DSS 3.2

The Payment Card Industry Data Security Standard (PCI DSS) published by the Payment Card Industry Security Standards Council (PCS SSC) is a set of regulations businesses must use to safeguard the financial and personal data of their customers throughout every point of a transaction. In response to the increase in payment information threats, version 3.2 of the PCI DSS is in full effect. PCI DSS is now recognized as a standard that can be updated with small revisions, rather than only when...

Read more

29
Jan

Protelligent Ensures Compliance with Duo Security

Duo Security knows security and compliance are crucial to ensuring the success of their customers. Their security expertise includes compliance, two-factor authentication and endpoint remediation that provides their customers with the tools they need to ensure they adhere to the latest in compliance standards. Protelligent® recognizes the importance of ensuring compliance, and has chosen to partner with Duo Security to provide solutions to our customers. Through Protelligent’s use of Duo...

Read more