Here are the signs that it’s time for a network upgrade. One of the common customer misconceptions I find is what I call “it’s all IT” mindset. Typically, the customer has a small IT department of server and desktop teams that are also expected...
The deadline for meeting NIST 800-171compliance is December 31, 2017. Perhaps you are already on your journey, perhaps you are just starting; regardless, compliance must be met by the end of the year. What does this mean for you? The biggest takeaway is this: you have...
Information-technology security professionals gathered Friday at Oregon State University-Cascades to learn new ways to protect their companies from attacks like the one that affected 40 million Target customers, or the one that affected 1 billion Yahoo users. While...
There is a new Wi-Fi vulnerability that requires immediate action in order to protect your network. A new bug, “KRACK,” puts almost every wireless-enabled device at risk for attack–including computers, phones, and routers. The bug exposes a flaw in...
Cybersecurity is complicated and can seem overwhelming. Many small business struggle to implement cybersecurity measures. At STN, we believe there needs to be a fundamental shift in how organizations, both large and small, respond to the need for information security....
Given all the attention-grabbing headlines around cybersecurity, and the strong desire to avoid becoming one of those headlines, it’s tempting for many businesses and organizations to hand over responsibility for information security to an external managed security...
Information is power. It is also a source of profit, whether it’s customer data, intellectual property or financial information. Protecting this revenue stream should be priority one for the C-suite. And it is – for the CSO, CISO, CIO or other security-minded...
One thing is hard to argue in today’s complex cyber world: cyber incidents are part of doing business. Chances are, your organization’s data will be—or already has been—breached. With an employee clicking on malware every 81 seconds in the U.S., according to a study...
What does it take to train for a marathon? Like anything else—with your goal and finish line looming ahead—it takes planning, effort, focus, pacing, and sweat. What Is the Goal? Get Your Security Foundation in Place Getting your company in compliance shape for NIST...
A Working Definition Found Through Pen Test Scoping Process A single, unified, complete, and universally-accepted definition of the term ‘Web application’ does not currently exist. Rather than attempt to come up with such a definition, STN security analysts define the...
For years, healthcare organizations from major medical centers to neighborhood clinics have limped along with a security posture that has them lagging behind other industries. HIPAA compliance has long been the standard of best practice for privacy and security...