Blog

A Solution to Securely Working From Home

Recently, various Educational Institutions have implemented and mandated that faculty, staff and students continue their semesters utilizing an online platform due to the dangers associated with COVID-19 (Coronavirus). The team at iSECURE understands the severity of this issue and the difficulties now placed on IT Departments to effectively and efficiently centralize the management of user…

Read More

Coronavirus: A CyberSecurity Concern?

Cybersecurity has proven to be a very demanding and difficult challenge for organizations to stay current and educationally up to date on. These challenges range anywhere from securely managing a growing remote workforce and their mobile devices, to targeted phishing attacks. Threats such as these, coupled with the growing concern and hysteria over the recent…

Read More

Your Network Security Roadmap

By: Dean Buczek Each news cycle seems more troubling than the last. You can’t open a web page or read a news story without seeing another company suffering from a data breach that’s exposed petabytes of sensitive user data, like credit card information or users’ names and passwords, or hearing about how vulnerable our critical…

Read More

How to Stay Relatively Un-Tracked Online

Dean Buczek-Security Engineer at iSECURE, LLC Recently I was asked my thoughts on this article: https://www.quora.com/Is-it-true-that-my-ISP-is-spying-on-my-web-browsing-Does-DuckDuckGo-fix-that/answer/Gabriel-Weinberg A summation of the article is that your Big Bad ISP is spying on you and DuckDuckGo can help stop it. Well, both of those statements are only partially true. Can your ISP tell what web sites you’re visiting?…

Read More

The Life Cycle Of a Firewall

 The Life Cycle of a Firewall Stages 1 – 4   The idea of firewalls hasn’t been revolutionary since the 90’s. With that said, they improve overall security posture by providing full visibility into users, devices, applications, and threats on the network. Next Generation Firewalls also have the ability to apply advanced threat protection anywhere in your…

Read More

10 Reasons Why You Need An iSECURE Pen Test

10 Reason Why You Need an iSECURE Pen Test Overview: A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. Such assessments are also useful in…

Read More

A fun infographic from Siemens about Cyber Security in the Industrial Sector

Kevin Wilkins CISSP – Chief Technology Officer I ran into this one while reading the daily rags. http://www.washingtonpost.com/sf/brand-connect/siemens/cyber-defense/#/ They mention security fundamentals and a security standard (ISA/IEC-62443, formerly ISA-99) targeted to Industrial Automation and Control Systems (IACS)/SCADA. They also mentioned a watering hole attack where equipment vendor websites are hacked then seeded it with malware. …

Read More

The REAL Reason Hackers Want to Stop the Hoodie Stereotype!

Donna Smith – Director of Marketing Sorry to say, if you missed out on attending our 2017 WNY Cyber Security Conference & Westchester NY Cyber Security Conference last month, you missed a lot! We had some of our BEST speakers yet, discussing some of today’s (and tomorrow’s) hottest security topics including IoT, grinding, train hacking,…

Read More

SEND THE ELEVATOR BACK DOWN!

Annette Warren – President/CEO I don’t know if you feel like this but, 2017 is flying by! I can’t believe it’s already August and back to school is just around the corner. As time marches on, I always talk about my daughters because I’m so proud of their journeys. The three of them are such…

Read More

Virus Total – A watering hole of proprietary information

Kevin Wilkins CISSP – Chief Technology Officer Gizmodo reports that a security researcher called DirectDefense discovered sensitive information uploaded to VirusTotal by Carbon Black endpoint agents. http://gizmodo.com/top-security-firm-may-be-leaking-terabytes-of-confident-1797667775 So, Carbon Black does cloud-based scanning.  Lots of security tools do this.  But what happens to that data to keep it private in the cloud?  In this case…

Read More