<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=381391698926062&amp;ev=PageView&amp;noscript=1">
//mega nav ctas

OneNeck Blog

Topic: Security

July 09, 2019 | Security

Anatomy of Ransomware

Ransomware is a type of malware that threat actors use to infect computers and encrypt computer files until a ransom is paid. After the initial infection, ransomware will attempt to spread to as many connected systems as possible, including  file systems and other accessible systems on a business’s network.

June 06, 2019 | Security

Enhance Security with an Analytics-Driven SIEM

 Finding a mechanism to collect, store and analyze security only data is relatively simple. There is no shortage of options for storing data. Collecting all security relevant data and turning all that data into actionable intelligence, however,...

June 04, 2019 | Security

Creating a strong external security posture is critical

Creating a strong external security posture is critical. But what can businesses do to protect their data and environments?

May 16, 2019 | Security

Older Windows Systems Beware of New Vulnerability

Are you running an older version of Windows and not current with your patch management? If so, you need to be aware of a recent exploitable vulnerability that just hit the news this week. Here's what you need to know...

May 09, 2019 | Security

Multi-Factor Authentication Explained

TeleSign research indicates that the majority of users use five or fewer passwords for all of their accounts. While it may seem efficient for password memory on your end, you could actually create a “domino effect” that allows hackers to take...

April 18, 2019 | Cloud

Disaster Recovery, A Primer for CIO's

How can a CIO be confident that IT will perform 24/7/365?  According to Zerto, in today’s always-on, information-driven organizations, IT resilience depends completely on IT infrastructures that are up and running 24/7. The costs of downtime are...

March 26, 2019 | Security

Credential Stuffing - What it is and How to Protect the Enterprise

Credential stuffing is a type of cyber-attack where hackers take combinations of usernames and passwords leaked from other sites and use them to gain access to accounts on another site.  F5 states that there’s typically a 1 to 2 percent success...

March 05, 2019 | Security

Anticipate 2019's Cybersecurity Threats Without a Crystal Ball

In Cisco’s February 2019 Threat Report, their cybersecurity experts analyzed prominent threats of the past year for clues to new attack strategies and targets. As they put it, “It's as close as we can get to anticipating future trends without a...

February 26, 2019 | Security

Blockchain: A Revolution in the Cloud for IT Security

Antiquated is not a word commonly associated with the advanced worldwide network of client-server configurations that make up modern data transmission. However, advances in data storage, file sharing and security protocols have struggled to keep...

January 29, 2019 | Security

Advances in Cybercrime Demand Greater Protection

A look at retrospective security versus point-in-time solutions With cybercrime predicted to reach $6 trillion annually by 2021 and to be more profitable—and therefore, more attractive to criminal organizations—than the global combined trade of...