5 Tips for Choosing a Next-Generation Firewall

| July 12, 2016

article image
Today’s multi-vector and persistent threats slip through gaps in protection and evade detection. A threat-focused NGFW provides best-in-class security technologies that work together across the network and endpoints and are managed through a central console. Built on a comprehensive stateful ¬rewall foundation, threat-focused NGFW technologies should include: Next-Generation IPS. Advanced Malware Protection. Application Visibility and Control. Reputation-based URL ¬ltering. Application-level VPN.

Spotlight

Bask Technology, Inc.

To help us grow and improve our services, our company has just completed a careful rebranding process. We are pleased to announce that iTOK is now officially Bask. While our name and logo has changed, our core vision, pricing, and services have not. To learn more, visit our new website at www.bask.com Founded in 2004, Bask is a leader in technology support, servicing consumers and small businesses worldwide. Bask's mix of remote technology support together with proactive maintenance and award-winning software is why it was recognized as the 24th fastest growing company in the region by the Mountain West Capital Network.

OTHER ARTICLES

Data Privacy Problem: Are Home Genealogy Kits a Security Threat?

Article | March 2, 2020

Surprising news recently emerged from the personal genetics business. The two leading direct-to-consumer companies in North America, 23andMe and Ancestry.com, announced within a week of each other that they were laying off a significant proportion of their workforce as a result of a steep drop in sales. This past Christmas, the sales of testing kits were expected to take a sharp hike — nothing says family like a gift that says prove it. But sales plummeted instead. According to Second Measure, a company that analyzes website sales, 23andMe’s business plummeted 54 per cent and Ancestry kits sales declined 38 per cent. Industry executives, market watchers and genealogists have all speculated about the causes of the drop in consumer interest. Market saturation? Early adopters tapped out? Limited usefulness? Recession fears? Whatever the theory, everyone seems to agree on one factor: privacy concerns.

Read More

The British government thinks process sensor cyber issues are real – what about everyone else

Article | February 16, 2020

When Joe refers to analogue devices, he is generally referring to ISA99 / IEC 62443 Level 0 devices, i.e. the sensors and actuators required in any cyber physical system. The vulnerability of these devices is often ignored as the security measures required to protect them are not purely technical but also involve physical and personnel security aspects along with process security (both of the metrology and processing by the device, as well as configuration management and control issues over the lifecycle of analogue devices). The security situation is not helped by the simplistic application of the triad of security goals (confidentiality, integrity and availability) to cyber physical systems.

Read More

A 4 Step Guide to Stronger OT Cybersecurity

Article | April 14, 2020

Security and risk management leaders at organizations around the world are increasingly concerned about cybersecurity threats to their operational technology (OT) networks. A key driver behind this is that cyberthreats, like disruptionware, are increasing in quantity and sophistication all the time. Industrial control system (ICS) networks are categorized as high risk because they are inherently insecure, increasingly so because of expanding integration with the corporate IT network, as well as the rise of remote access for employees and third parties. An example of an IT network within a control system is a PC that’s running HMI or SCADA applications. Because this particular PC wasn’t set up with the initial intention of connecting to IT systems, it typically isn’t managed so can’t access the latest operating system, patches, or antivirus updates. This makes that PC extremely vulnerable to malware attacks. Besides the increased cyberthreat risk, the complexity resulting from IT–OT integration also increases the likelihood of networking and operational issues.

Read More

How Is Covid-19 Creating Data Breaches?

Article | March 30, 2020

Trevor is working from home for the first time. He loves the freedom and flexibility, but doesn’t read his company’s new BYOD policy. Sadly, he misses the fact that his home PC is not protected with updated security software nor the latest operating system patches. Kelcie’s home PC is faster than the old work laptop that she’s been issued to use during the pandemic. She decides to use a USB stick to transfer large files back and forth between her PCs to speed things up. After a few days, she does all her work on her home PC, using a “safe” virtual desktop app. But unbeknownst to her, there is a keylogger on her home PC.

Read More

Spotlight

Bask Technology, Inc.

To help us grow and improve our services, our company has just completed a careful rebranding process. We are pleased to announce that iTOK is now officially Bask. While our name and logo has changed, our core vision, pricing, and services have not. To learn more, visit our new website at www.bask.com Founded in 2004, Bask is a leader in technology support, servicing consumers and small businesses worldwide. Bask's mix of remote technology support together with proactive maintenance and award-winning software is why it was recognized as the 24th fastest growing company in the region by the Mountain West Capital Network.

Events