Blog
Ransomware – still talk of the town?
Kevin Wilkins CISSP – Chief Technology Officer Ransomware attacks are still talk of the town – and with good reason. They’re disruptive, destructive, expensive, and embarrassing. An attack against a vulnerable organization can bring that company to its knees. The low-hanging fruit of file shares are first to go, and if the malware has worm…
Read MoreiSECURE Welcomes Michael Schade to the Team!
My name is Michael Schade and I am currently a 3rd, almost 4th year, Computing Security student at Rochester Institute of Technology. Being from Long Island, distance did not stop me from following my passion of technology and going to a school that would give the me opportunities of a lifetime. The experiences that I’ve…
Read MoreCalling All Cyber Security Superheroes…
Donna Smith – Director of Marketing Monday night, 22 innocent people, including children, were victim to a suicide bomber in Manchester. Social media posts quickly turned from the ongoing #wannacry articles, to people showing their condolences to the families of the victims. One post, from a well-known “hacker”-friend of mine caught my eye: Didn’t take…
Read More3 Things I Learned from iSECURE’ s “March Brewery Madness” Tour
Joe Milliken – Regional Sales Manager Being a huge college hoops fan, March Madness is unquestionably my favorite time of year. To tip the season off this year, iSECURE had a roadshow of events, and our marketing gurus (Donna Smith and Marc Johnson) did an amazing job with these! A lot of events…
Read MoreRemote Access has often been a challenge for enterprises since the dawn of the modem.
Kevin Wilkins – Chief Technology Officer Computational resources were now available outside your four walls and away from the watchful but sullen eyes of a SysAdmin or Labbie. But access to the necessary remote equipment, skills, and credentials were restricted to an elite class of wizard, most of whom were classified as “good”. Welcome…
Read MoreWhy We Don’t Need to Talk About Target Anymore
Kevin Wilkins – Chief Technology Officer Greetings: Us folks in Cybersecurity have been using the Target breach as our kicking toy for years. The weaknesses in so many defensive layers could contribute to entire books on the topic. But now there is something much more epic to talk about – and I…
Read MoreInformation Security Risks – A Star Wars Story (SPOILERS)
WARNING! This blog contains Spoilers to the movie Star Wars: Rogue One. Do not read any further if you have not yet watched the movie and don’t want it ruined for you. Last chance to stop reading. Okay… Tom Bard – Information Security Engineer The Re-programed Droid… There are a…
Read MoreWhy iSECURE
JoJo Luna – Client Account Representative During Cybersecurity awareness month, my team at iSECURE decided to go digital and highlight 5 of the many reasons why to choose iSECURE? As the newest member of the iSECURE family, the answer was simple – passion for great service. Since 2014 cyber security has been such a hot…
Read MoreONCE YOU HACK, YOU NEVER GO BACK
Donna Smith – Director of Marketing *The views expressed in this blog do not necessarily represent the views of iSECURE or the individuals mentioned within it.* “Hacker” can often have a negative connotation associated with it. In the media, we hear about these hackers stealing our credit card data, personal information, and costing businesses millions…
Read MoreWHY IT’S IMPORTANT TO DO THINGS THAT SCARE YOU
Marc Johnson – Marketing Assistant Over the past year, there have been so many instances where I’ve been forcefully taken out of my comfort zone. Primarily in my professional life. What is it that I do, you ask? I work in the terrifying world of MARKETING… (woooooooo). Okay, it’s not that scary when you compare…
Read More