Have you ever been looking over your SonicWall logs and reports and thought, “I wonder who was at IP 192.168.1.56 streaming YouTube all day?” Or maybe you have wondered what user at IP 10.10.10.152 tripped the Gateway Anti-Virus signature AdvancedKeyLogger.M (Trojan). Had you been using the built in SonicWall feature, Single Sign On (SSO), you … Continue reading “SonicWall Single Sign On: End the “Who is that IP” Guessing Game!”
The fact that being PCI DSS (Payment Card Industry Data Security Standards) compliant does not also make your network fully secure is not a new revelation. These standards of compliance were developed by and are enforced by the PCI Data Security Standards Council, which was founded by Discover Financial Services, American Express, JCB International, MasterCard … Continue reading “Bridging the Gap Between PCI Compliance and Security”
Have you wanted to take a look under the Cylance hood, but just haven’t been able to schedule a demo? Take some time and view this recent webinar for a through overview of CylancePROTECT and watch a deep dive live demo of the product in action. This webinar demonstrates the power of machine learning and … Continue reading “CylancePROTECT Webinar: Demo and Deep Dive”
It is 2018 and “Yes!” we are still dealing with passwords!! In Part 3 of our Security Best Practice series, we are going to dive into Password Creation and Management. You arrived in the office nice and early to start this week off, right? You are getting ready to enjoy your first cup of coffee … Continue reading “Password Creation & Management – Security Best Practice Series – Part 3”
Cerdant was extremely busy in 2017. Not only with day to day business operations, but also with increasing our product portfolio and enhancing our current service offerings. At Cerdant, we strive to provide the best Customer Support experience possible. We also strive to enhance our technology, provide better features, and increased value for our customers. … Continue reading “Cerdant IDS Enhancements – Sentry 2.0!”
It is time to get some more valuable information into your hands. In Part 2 of our Security Best Practice series, we are discussing steps that you can take as a Network Administrator to help secure your network. Lets dive into Network Segmentation. Taking the proper steps to segment your business network(s) is one of … Continue reading “Network Segmentation: Security Best Practice Series – Part 2”
Unfortunately, news broke yesterday that Equifax (one of the top three companies in the US that calculates credit scores) was breached. This data breach might have allowed up to 143 million customer’s information to have been stolen. This information contains names, addresses, birth dates, Social Security Numbers, plus more. The data breach that was discovered in … Continue reading “Security Alert: Equifax Data Breach”
By controlling and or limiting administrative access on your devices you are going to be able to help limit the scope of security concerns.
A Cerdant engineer discovered a new variant of Locky Ransomware, Diablo6, and then tested it against Cylance and SonicWall Capture ATP.
The Development of Today’s Malware A major challenge of network security is that it’s easier now more than ever to create malware that has never been seen before, thus bypassing traditional signature-based detection. Hackers can easily repackage their threats and launch them again once they have been detected and signatures created. The rapid increase in … Continue reading “Preventing Today’s Malware”