Network Segmentation: Security Best Practice Series – Part 2
Joshua Skeens, November 20, 2017

It is time to get some more valuable information into your hands. In Part 2 of our Security Best Practice series, we are discussing steps that you can take as a Network Administrator to help secure your network. Lets dive into Network Segmentation. Taking the proper steps to segment your business network(s) is one of … Continue reading “Network Segmentation: Security Best Practice Series – Part 2”

Security Alert: Equifax Data Breach
Joshua Skeens, September 8, 2017

Unfortunately, news broke yesterday that Equifax (one of the top three companies in the US that calculates credit scores) was breached. This data breach might have allowed up to 143 million customer’s information to have been stolen. This information contains names, addresses, birth dates, Social Security Numbers, plus more. The data breach that was discovered in … Continue reading “Security Alert: Equifax Data Breach”

Local Administrator Rights and Privileges: Security Best Practice Series – Part 1
Joshua Skeens, September 7, 2017

By controlling and or limiting administrative access on your devices you are going to be able to help limit the scope of security concerns.

Diablo6 Locky Ransomware In The Wild: Unable to Evade Next-Generation Security
Jason Palm, SR. Network Security Engineer, August 10, 2017

A Cerdant engineer discovered a new variant of Locky Ransomware, Diablo6, and then tested it against Cylance and SonicWall Capture ATP.

Preventing Today’s Malware
Jason Palm, SR. Network Security Engineer, July 14, 2017

The Development of Today’s Malware A major challenge of network security is that it’s easier now more than ever to create malware that has never been seen before, thus bypassing traditional signature-based detection. Hackers can easily repackage their threats and launch them again once they have been detected and signatures created. The rapid increase in … Continue reading “Preventing Today’s Malware”

Ransomware Defense is the New Norm
Jason Palm, SR. Network Security Engineer, June 28, 2017

Dominating the news once again are reports of a new and far reaching ransomware attack, Petya. Petya as a malware is not new, but this “Petya-like” threat is using the NSA’s EternalBlue exploit involved in last month’s WannaCry Ransomware outbreak.

Change in the World of Information Security
Cara Parfitt, March 29, 2017

Cerdant has become a reseller of Cylance because it is the most effective endpoint security solution in existence.

Don’t Let Malware Ruin Your Reputation: Secure Your Retail Network
Cara Parfitt, February 6, 2017

Help keep cybercriminals away, protect your brand’s reputation, and avoid the time and expense of costly data breaches with SonicWALL.