sberger

About Shane Berger

This author has not yet filled in any details.
So far Shane Berger has created 78 blog entries.

Infographic: Who Hackers Target During A Cyberattack

A recently-published infographic from CBTS breaks down the different types of cyberattacks and how your company can stay protect itself. Passwords like '12345' and 'password' aren't going to cut it anymore. Hackers target everyone, including you and your business. A new infographic from CBTS, an IT service management company, titled: Why Your Business Network Is A Hacker's [...]

By | September 18th, 2017|Uncategorized|0 Comments

How To Design A Network That Meets All Of Your Users’ Needs

At the VMworld 2017 conference, Moffitt Cancer Center CTO Tom Hull talked about how the hospital designed a network that met its users different needs. http://www.techrepublic.comhttp://www.techrepublic.com/videos/video-tips-for-designing-your-network-to-meet-the-needs-of-different-sets-of-users/ When designing a network, organizations must cater to users' diverse needs. Tom Hull, CTO at the Moffitt Cancer Center (MCC), described how the hospital designed a network that allowed [...]

By | September 13th, 2017|Uncategorized|0 Comments

Equifax Breach: 5 Defensive Steps To Take Now

As you may have heard from the copious news coverage (including our own), the credit monitoring bureau Equifax, was hit with a security breach which has given thieves access to the data of 143 million people; this information comes primarily from customers in the US, as well as some in the UK and Canada. The data [...]

By | September 11th, 2017|Uncategorized|0 Comments

New Report Unveils Top 3 Cybersecurity Threats Facing Business Data

For organizations securing sensitive data, ransomware, insider vulnerabilities, and denial of service attacks are their most-feared threats, according to a new report from the SANS and Infoblox. http://www.techrepublic.comhttp://www.techrepublic.com/videos/video-how-visa-mitigates-ddos-ransomware-and-iot-cyber-attacks/ Ransomware, insider threats, and denial of service are the three biggest threats faced by organizations as they try to secure sensitive data, according to a new study [...]

By | September 8th, 2017|Uncategorized|0 Comments

Disruptive Cyberattacks Could Hit Energy Infrastructure in US, Europe

A report from Symantec has identified the re-emergence of a hacking group called Dragonfly, which seems to be targeting the energy sector. http://www.techrepublic.comhttp://www.techrepublic.com/videos/video-what-happens-at-the-government-when-a-cybersecurity-threat-is-identified/ A new "wave of cyberattacks" could be poised to hit the energy sectors of the US, Turkey, and Switzerland, giving hackers the ability to "severely disrupt affected operations," according to a new report from [...]

By | September 6th, 2017|Uncategorized|0 Comments

10 Tips For Reducing Insider Security Threats

Insider threats can pose greater risks to company data than those associated with external attacks. Here are some techniques to help you spot and mitigate them as quickly as possible. A report recently released by the Institute for Critical Infrastructure Technology pointed out that most cybersecurity incidents (both intentional and accidental) are the result of some action [...]

By | September 5th, 2017|Uncategorized|0 Comments

How One Marketing Company Used A Cloud Solution To Address Project-Related Security Risks

Keeping company data secure can get tricky when collaborating with remote employees and contractors. Here's how AdRoll, a marketing platform provider, addressed that issue using a cloud-based service. http://www.techrepublic.comhttp://www.techrepublic.com/videos/5-things-to-know-about-cloud-security/ Security risks are not new in business. Project managers and IT teams are continually tasked with addressing risks to safeguard sensitive information. Some primary risk-related concerns [...]

By | September 1st, 2017|Uncategorized|0 Comments

New ESET Research Uncovers Gazer, The Stealthy Backdoor That Spies On Embassies

Security researchers at ESET have released new research today into the activities of the notorious Turla cyberespionage group, and specifically a previously undocumented backdoor that has been used to spy on consulates and embassies worldwide. ESET’s research team are the first in the world to document the advanced backdoor malware, which they have named “Gazer”, despite evidence that [...]

By | August 30th, 2017|Uncategorized|0 Comments

VMware AppDefense automates security for apps and data in virtual environments

The solution, two years in the making, relies on intent-based security to protect applications running on virtualized or cloud environments. By Conner Forrest | August 28, 2017, 5:00 AM PST 5 Things To Know About CLOUD Security A new service from VMware, announced Monday at the 2017 VMworld conference, could make it easier for businesses to secure apps [...]

By | August 28th, 2017|Uncategorized|0 Comments

10 browser extensions to keep you safe on the web

You can never be too careful It seems every time you hit F5 there's a new story about a massive corporate hack, a new ransomware outbreak, or the spread of dangerous new malware. Unfortunately, you don't need to do much to compromise your security--even browsing sites deemed safe can lead to an infection from a [...]

By | August 26th, 2017|Uncategorized|0 Comments