Why is my toaster talking to my accounting software? Are internal or outside devices causing DDoS or botnet attacks? Larry Bianculli discusses IoT device security, current and future concerns, with Matthew Pascucci and Joe Goldberg.
IT has long shaped major corporations and made them stronger in the marketplace. Yet if you listen to investors and accountants, they are often viewed as a department that is really one of the larger cost centers in any company.
The question then, is how can a company use IT in a way that allows it to add to the success of a business in a greater way than it costs overall? For most companies, the answer is to play some of your opportunity forward and make strategic choices that may provide competitive advantage regardless of the added expense.
There are two maxims essential to the understanding of security. First, no security system is 100% effective. Second, hackers are always preparing for future attacks, and you need to be ready, too.
Future-proofing cybersecurity is notoriously difficult because no one really knows what’s around the corner. However, many of the principles that will keep you safe in the future are already well known.
Cloud computing has drastically changed how people store and access data. For example, employees can access the information required to do their work from anywhere, even while on the road.
However, you’re probably keeping customer data in the cloud, too. If so, you have an additional obligation to protect that information. Here are five things to know when accomplishing that:
Over the last few years, the word “disruption” became one of the most common terms when talking about the tech industry. According to Google Trends, the use of this term has been steadily increasing during the last nine years, peaking in July 2019. Today, the new technology doesn’t just make our lives easier but changes our way of thinking. The tech industry itself transforms quickly, so it becomes especially important for brands, tech experts, and marketers to keep up with the latest trends.
Just like any other industry, healthcare must be ready to handle cybersecurity threats.
What’s more, clinics and hospitals have to prove over and over again – the devices, technologies, and methods they use don’t bring any risk to patients.
To do that, healthcare institutions start compiling their security with recognized standards and frameworks like NIST or HITRUST.
But what exactly is a security framework? Which one should you use? What’s the right way to implement it?
According to a recent study, a new cyberattack occurs roughly every 39 seconds or 2,244 times a day. A successful attack costs an average of US$3.9 million to identify, eliminate, and recover from. The chance that an attacker will attempt to breach your systems is incredibly high. However, this doesn’t mean you’re helpless.
You can use Endpoint Detection and Response (EDR) to significantly reduce your risks and potential costs. In this article, you’ll learn what EDR is and what kind of threats it can protect you from. You’ll also learn some best practices for implementing EDR to ensure your system is maximally protected.
It was our third CISO roundtable that we hosted at a local vineyard and the conversation was as lively as ever. I’m not sure if it was the wine tasting, the food or the experience of the CISO’s in attendance, but this event was lively discussion that focused on “Building a Defendable Enterprise with Continuous Monitoring”. The excitement and passion that was coming back from our attendees was nothing short of encouraging to see how these leaders in our field are taking their roles serious in defending their organizations. It was once again a privilege to be in the midst of these leaders learning from their wisdom and experience in the field. This blog is being written as recap of a few highlighted discussion points throughout evening that were discussed.
This week’s guest is Larry Bianculli, managing director, with CCSI who provide MSP and MSSP services in the New York City/Long Island area. CCSI (which stands for Contemporary Computers Services) has been around since 1974. CCSI has always been focused on services, the founders coming from IBM. CCSI has a range of customers from SMB to fortune 500. They have customers around the US as well as overseas.
Larry has been with CCSI for 4 years and is focused on growing the enterprise and commercial business. Prior to CCSI Larry spent over 15 years working for vendors (both big and small). For their large customers, CCSI helps to augment their IT staff in specialized areas. They’ve seen some great opportunities with co-managed SIEM. CCSI focuses mostly on financial, healthcare, insurance and manufacturing.
Listen to the full episode for more information on how CCSI has been so successful over the years by essentially thinking of themselves as a startup.
Technology, data and a highly-connected team are more important than ever for businesses of any size. Traditional, offline solutions can be effective, but many businesses are finding that there are better answers.
Now, many companies are turning to solutions on the cloud to provide their teams with storage, speed and tools they wouldn’t have otherwise.