Category: Security

Chuck Leaver – Migrating Your Assets To The Cloud The Painless Way

Written By Logan Gilbert And Presented By Chuck Leaver   It bears repeating – the Web has forever changed the world for individuals and organizations alike. In the case of the latter, every aspect of modern IT is going through digital improvement. IT departments all over are under pressure to make info extremely accessible and



Chuck Leaver – Hot Security Opportunity For Microsoft Channel Partners

Written By Greg McCreight And Presented By Chuck Leaver   Windows Defender Advanced Threat Protection (WDATP) is very good, popular with Microsoft channel partners all over the world. It is highly likely you’re currently working with Microsoft clients to install and look after WDATP on their Windows end points. I’m delighted to tell you about



Chuck Leaver – Why Has It Taken The Girl Scouts To Raise The Profile Of Females In Cybersecurity?

Written By Kim Foster And Presented By Chuck Leaver   It’s clear that cybersecurity is receiving more global attention than before, and enterprises are rightfully worried if they are training adequate security experts to meet growing security dangers. While this concern is felt throughout the business world, lots of people did not anticipate Girl Scouts



Chuck Leaver – Don’t Risk Your Enterprise Security By Not Checking Mac Computers

Written By Roark Pollock And Presented By Chuck Leaver   Got Macs? That’s fine. I also own one. Have you locked your Macs down? If you haven’t, your enterprise has a possibly serious security weak point. It’s a misconception to believe that Macintosh computer systems are inherently secure and do not need to be safeguarded



Chuck Leaver – Without Strategic Alliances Security Issues Will Continue

Written By Chuck Leaver   No one can solve cybersecurity alone. No one solution business, no one service provider, no one can deal with the whole thing. To take on security needs cooperation between different players. In some cases, those players are at different levels of the service stack – some install on endpoints, some



Chuck Leaver – Is Your SysSecOps Solution Really Flexible?

Written By Chuck Leaver   You will find that endpoints are all over. The device you read this on is an endpoint, whether it’s a desktop, laptop, tablet, or phone. The HEATING AND COOLING controller for your structure is an endpoint, presuming it’s linked to a network, and the WiFi access points and the security



Chuck Leaver – New Meltdown And Spectre Threats And How Ziften Helps

Written By Josh Harriman And Presented By Chuck Leaver   Ziften is aware of the latest exploits affecting virtually everybody who deals with a computer system or digital device. While this is a huge statement, we at Ziften are working very hard helping our consumers find susceptible assets, fixing those susceptible systems, and keeping track



Chuck Leaver – What Is SysSecOps And Why Do You Need It?

Written By Alan Zeichick And Presented By Chuck Leaver   SysSecOps. That’s a neologism, still unseen by many IT and security administrators – but it’s being discussed within the market, by analysts, and at technical conferences. SysSecOps, or Systems & Security Operations, refers to the practice of combining security teams and IT operations teams to



Chuck Leaver – Ziften Helps You Fight Microsoft Word Phishing Attacks

Written By Josh Harriman And Presented By Chuck Leaver   A fascinating multifaceted attack has actually been reported in a recent blog by Cisco’s Talos Intelligence group. I wanted to talk about the infection vector of this attack as it’s quite interesting and something that Microsoft has actually promised not to fix, as it is



Chuck Leaver – Ransomware Can Be Prevented And Managed Taking These 4 Actions

Written By Alan Zeichick And Presented By Chuck Leaver   Ransomware is real, and is striking people, services, schools, health centers, local governments – and there’s no sign that ransomware is stopping. In fact, it’s probably increasing. Why? Let’s face it: Ransomware is probably the single most reliable attack that cyber criminals have ever developed.