Naples, FL, USA
Jul 19, 2019 | By
California's state auditor is calling for additional oversight and regular assessments after finding weaknesses in the information security of some California state offices. State auditor Elaine Howle recently released a report Gaps in Oversight Contribute to Weaknesses in the State's Information Security and found that the personal information of California residents may not be secure due to flaws in the government's IT systems.
Jul 18, 2019 | By
Business Email Compromise (BEC) scams have increased in volume and value over the last two years, with new data showing cybercriminals make over $300 million per month from US victims alone.
Jul 16, 2019 | By
Support for Microsoft's 10-year-old operating system, Windows 7, will officially end in six months, yet research shows 18% of larger enterprises still have not migrated to Windows 10. At the beginning of the year, researchers found that 43% of organizations were still running Windows 7, 17% of which had no clue when the official end of life date was for the operating system.
Jul 15, 2019 | By
Amazon Prime Day is in full effect and so are hackers working on elaborate phishing scams targeting Amazon shoppers. Amazon announced that over one million items will be discounted on July 15 and 16, leaving bargain shoppers racing to buy. But while shoppers are busy searching for the best deals on this Prime Day, malicious actors are looking to scam. McAfee reported a popular phishing kit, 16Shop, recently shifted its attention to Amazon.
Jul 12, 2019 | By
Premera Blue Cross has agreed to pay $10 million to 30 states following a data breach that exposed sensitive information on over 10 million people across the country.
Jan 21, 2019 | By New Net Technologies
Given the latest WannaCry Ransomware epidemic, which infected more than 230,000 users in over 150 countries, it’s vitally important that organizations fully understand the risks associated with using out-of-date systems and software.
Jan 1, 2019 | By New Net Technologies
Without our help, controlling changes can be one of the biggest challenges facing multi-functional IT Teams. The size of task, process, and coordination of effort often means that changes continue to occur outside of any planned change approvals and the IT team is unable to prevent this from continuing. The solution? NNT’s Managed Change Control Program.
Dec 1, 2018 | By New Net Technologies
In early 2017, NNT assembled a panel of experts to discuss the increased importance of applying the Center for Internet Security Controls as part of a modern approach to cyber security. The session also highlighted the benefits of combining the CIS Controls with ongoing, real-time compliance monitoring.
Nov 1, 2018 | By New Net Technologies
Some of us will need therapy during and after an audit - that’s not unusual - but can a Compliance Audit really bring about the same feelings as other forms of grief? Furthermore, if this really is the case then, by extension, could we coach ourselves through the compliance audit process to become more effective at dealing with future audit situations?
Oct 1, 2018 | By New Net Technologies
Right now, Ransomware is the Great White Shark of cyber-attacks, the most feared malware of all, and both corporate and home users are running scared. And rightly so - Anyone who has had experience with Ransomware, will attest to the agony and disruption. But instead of worrying about an attack, what action can be taken to safely venture back into the water and not necessarily “with a bigger Boat”?
Jul 15, 2019 | By New Net Technologies
NNT’s intelligent integration module seamlessly integrates with BMC’s security and ITSM products to effectively mitigate security risks and service downtime and availability. The collaboration of products enables your teams to prioritize and remediate critical vulnerabilities, and systematically address compliance violations whilst improving operational integrity, security and compliance.
May 20, 2019 | By New Net Technologies
NNT now offer intgeration with the world leading ITSM solutions from Cherwell to deliver Closed Loop, Change Control. What this means is that approved Changes are validated automatically, with a full audit trail of what actually changed, and this all gets reconciled with your Change Requests.
Feb 27, 2019 | By New Net Technologies
SecureOps combines established best practices for security and IT service management to deliver a holistic and comprehensive solution that identifies and highlights unknown, unwanted and potentially malicious events in real-time…without all the NOISE and headaches of endless alerts.
- February 2017 (1)
- April 2017 (1)
- October 2017 (1)
- November 2017 (1)
- April 2018 (1)
- May 2018 (2)
- July 2018 (1)
- August 2018 (1)
- September 2018 (4)
- October 2018 (8)
- November 2018 (4)
- December 2018 (2)
- January 2019 (6)
- February 2019 (4)
- March 2019 (1)
- April 2019 (3)
- May 2019 (8)
- June 2019 (6)
- July 2019 (12)