See the forest for the Trees

Posted by & filed under Security.

The human nervous system includes 5 senses with a dedicated sensory system for each. While all important to our personal lives, Sight is probably most important in the professional lives of information security and technology staff. To make informed decisions, we need to See everything connected to the network and understand the meaning of critical… Read more »

How are you controlling BYOD devices?

Posted by & filed under BYOD, Security.

  Seeing is believing, control is even better. It is no secret that the number of connected devices has and will continuing to grow at an explosive rate.  Gartner estimates by 2020, the number of connected devices will exceed 20 billion. For me, it is pretty easy to believe their estimate.  Like most people, I… Read more »

The New Generation of Criminals

Posted by & filed under Security.

You turn on your computer and find a notice that all your files have been encrypted and will be destroyed unless you pay a ransom. There’s a clock ticking down the seconds. Your files are being held hostage and so is your organization. Paying ransom is the least of your worries; the biggest cost to your business will be the… Read more »

Top Attacks and Breaches for the week of March 14th to 20th

Posted by & filed under Security.

One of Brite’s partners, Check Point, complied the a list of Top Attacks and Breaches that took place last week, March 14th – 20th, 2016.  Cyber threats transform at a rapid rate.  Yesterday’s technology may not protect against tomorrow’s attacks. Fortunately, Brite has many partners that are continuously developing new technologies to protect your data.   Click… Read more »

Rochester Security Summit: Stephen Johnson, Check Point

Posted by & filed under BYOD.

We’re less than a week away from the Rochester Security Summit! The theme of this year’s event? The Right to Privacy: Balancing Privacy and Security. Speakers include cyber security experts from various verticals, who will all touch on the latest trends in security and how organizations balance privacy and security of data. Speaking at this year’s event is Stephen… Read more »

Rochester Security Summit: Ron Arden, Fasoo

Posted by & filed under Security.

We’re 10 days away from the Rochester Security Summit! The theme of this year’s event? The Right to Privacy: Balancing Privacy and Security. Speakers include cyber security experts from various verticals, who will all touch on the latest trends in security and how organizations balance privacy of data and security of data. Speaking at this year’s event is… Read more »

6 tips to implement data-centric security

Posted by & filed under Security.

Funded. Well-trained. Prepared. The malicious criminals who attack organizations are not amateurs. Quite the contrary, actually. Not only are they very well prepared, their attacks are targeted. It’s not the amount of data that matters; rather, it’s the right data, the most sensitive. Intellectual property, sensitive emails, customer information, trade secrets are just the beginning. These… Read more »

Rochester Security Summit: Jonathan Borgesen

Posted by & filed under Security.

The countdown is on! The Rochester Security Summit is 26 days away, and this is the first edition of Rochester Security Summit Thursday. Every Thursday until the event, we’d like to give you a bit of what conference attendees will experience. First, let’s talk about the theme of this year’s event. The theme of this… Read more »

Fraud, cyber security breaches follow mobile revolution

Posted by & filed under Uncategorized.

Smartphones have now overtaken laptops as the most popular means of accessing the Internet – up to two hours per day, according to Ofcom. Not surprisingly, hackers continue to attack mobile devices at a staggering rate. In fact, experts recently revealed that 95 percent of all Android smartphones can be exploited with a single text message from… Read more »