Ransomware Attacks: How Prepared Are SMBs?

Category: Security

Ransomware Attacks: How Prepared Are SMBs?

Ransomware Attacks: How Prepared Are SMBs?

by Dan Humphries Ransomware is a type of malware that encrypts the files on a computer, then charges the user a fee to regain access. New strains appear online with alarming frequency, and traditional anti-virus is powerless to prevent these attacks until they have been identified—leaving many businesses at risk. In this report, we investigate […]

Security

Security

First Fridays with Raj: SOP Culture – Generating Scheduled Security Compliance Reports February 12, 2016 at 10:00AM NEW DATE FOR FEBRUARY’S FIRST FRIDAY: FEBRUARY 12, 2016! WATCH NOW Everybody knows that our clients are subject to increasing regulations. And we all know that we need to conduct periodic assessments to show the current state of […]

First Fridays with Raj – SOP Culture – Generating Scheduled Security Compliance Reports

First Fridays with Raj – SOP Culture – Generating Scheduled Security Compliance Reports

First Fridays with Raj: SOP Culture – Generating Scheduled Security Compliance Reports February 12, 2016 at 10:00AM NEW DATE FOR FEBRUARY’S FIRST FRIDAY: FEBRUARY 12, 2016! Everybody knows that our clients are subject to increasing regulations. And we all know that we need to conduct periodic assessments to show the current state of information security […]

From the Trenches – End-Uses: The Wildcard in Placing Your Data in the Cloud

From the Trenches – End-Uses: The Wildcard in Placing Your Data in the Cloud

From the Trenches – End-Uses: The Wildcard in Placing Your Data in the Cloud Date: Tuesday, November 24, 2015 Time: 1:00pm Eastern / Duration: 60 minutes While compliance frameworks and corporate edicts are well and good, many companies are seeing their intellectual property and other sensitive information being placed in the cloud….all without the knowledge […]

Payroll Heists, Cybercriminals, and You: Best Practices in Protecting Your Organization

Payroll Heists, Cybercriminals, and You: Best Practices in Protecting Your Organization

October 22, 2015 – 8:30am – 10:00am National American Payroll Association/Long Island Chapter Seminar Raj Will Present: Payroll Heists, Cybercriminals, and You: Best Practices in Protecting Your Organization There are only 2 kinds of people. People who are about to be hacked; and those who’ll be hacked again. It’s as simple as that – either […]

Panopticon 2015: Continued Erosion of Privacy Rights (and Occasional Victories)

Panopticon 2015: Continued Erosion of Privacy Rights (and Occasional Victories)

61st Annual ASIS International Seminar in Anaheim, CA Panopticon 2015: Continued Erosion of Privacy Rights (and Occasional Victories) presented by Raj Goel Download Presentation (PDF)

Raj is quoted in CIO.com’s article “Why CIOs should worry about the Internet of Things” by Jonathan Hassell

Raj is quoted in CIO.com’s article “Why CIOs should worry about the Internet of Things” by Jonathan Hassell

The Internet of Things brings with it the promise gee-whiz applications and life-changing innovation. But one thing’s for sure – there are as many questions as there will be gigabytes of data being poured into your data centers. The Internet of Things (IoT) has the promise to make everything more intelligent and efficient. Smart grids, […]

Raj is quoted in a Channelnomics article “Security about livelihoods, not data” by Jessica Meek in Las Vegas

Raj is quoted in a Channelnomics article “Security about livelihoods, not data” by Jessica Meek in Las Vegas

Raj is quoted in a Channelnomics article “Security about livelihoods, not data” by Jessica Meek in Las Vegas September 29, 2015 Risk of losing income greater than risk of losing data, panelists debate. Security is not about data being at risk, but livelihoods, partners heard at Continuum Navigate 2015 in Las Vegas today. During a […]

2015 Trends in Financial Crimes

2015 Trends in Financial Crimes

Trends in Financial Crimes – How insecure software, poor development practices and poor management enable cybercrime, Raj Goel Why does SPAM exist? What types of crimes are we enabling by use and misuse of social media? How are small businesses, churches and schools being robbed of hundreds of thousands of dollars? And what do warehouses […]

Tech analyst on Ashley Madison hack: ‘Internet security is an oxymoron – it does not exist’

Tech analyst on Ashley Madison hack: ‘Internet security is an oxymoron – it does not exist’

Article by Jay Dow, PIX11, July 21st, 2015 You find your way to the dating website Ashley Madison because either you’re married – or attached – but still want to date secretly – without worrying that your spouse or significant other will find out. So imagine when the website that advertises itself as an online […]