Why You Need a Mobile Workspace
This is the view down my driveway today. I realize that my friends in the Midwest are either laughing or shaking their heads (or both) at the relatively miniscule amount of snow – but I live in one of the suburbs of Seattle, where the only people whom you can...Important End of Support Dates for Windows Server 2008 and SQL 2008
It’s that time again – time to prepare for the passing of workhorse products that served our enterprises well, but are now over a decade old and need to be retired before they become security risks to your organization. SQL Server 2008 and 2008 R2 will hit the “End of...Just when you thought the work was done … A Fortinet Success Story
Not long ago, our Xiologix CTO was working with a new manufacturing client. They initially worked with a different partner and brought us in to work with them on their security posture because the other partner left them still needing more in the manner of...Cybercriminals Use HTTPS Links to Gain Access to Your Data
According to Phishme research, 91% of attack-related data breaches begin with a spear phishing email. Most of us have heard about phishing and know to stay away from unsafe sites but did you know that 80% of people polled by APWG believe that the HTTPS notation along...Where Is Your Security Perimeter?
We live and work in a mobile-first, cloud-first world. But the cloud revolution hasn’t happened the way many people expected it to happen. Instead of organizations moving everything wholesale to the cloud in a “lift and shift” approach, it’s happened just like the...Online Safety at Home
While internet usage in the home continues to grow, so does our need to learn, exercise and share internet safety. From posting on social media to using the latest internet-connected toy, it is imperative that everyone from children through older adults learn to use...
5 Reasons to Purchase Cybersecurity From a VAR
The digital business model requires organizations to adopt a new approach to securing data and networks. At the same time, technology and networks are evolving, making security more complex. One of the biggest challenges is the sheer number of security products and...
Let’s Talk About Passwords
Ugh. Passwords. The concept has been around as long as civilization itself. But are they the best way to protect account access in the digital age? How do you insure that people use “strong” passwords? What is a “strong” password, anyway? And...Think You’re Too Small to Be Targeted? Think Again!
I got an interesting email this morning. It was “from” one of the owners of Xiologix – but the return address was a bit odd: “ofceo@comcast.net” As this unfolded, it became obvious that this was a classic “spear phishing”...