• Blog
  • www.ezfim.com
  • About
  • Solutions
  • PCI DSS 3.0
  • Contact Us
  • Media
    • Twitter
    • Facebook
    • LinkedIn

EzFIM

~ File Integrity Monitoring

EzFIM

Tag Archives: MSSP

Is Your Smartphone Smuggling a Hacker?

24 Monday Feb 2014

Posted by EzFIM in Managed Security Service Provider (MSSP), Smartphone Security

≈ 2 Comments

Tags

BYOD, ezfim, file integrity management, FIM, Hacker Prevention, iPhone, Managed Security Service Provider, MSSP, NetBoundary, Norton Snap, QR Codes, Smartphone Security, SOPHOS, Wi-Fi

How secure is your smartphone?

How secure is your smartphone?

Smartphones are fantastic.  They enable us to peruse the Internet, check our email—and even allow us to communicate with friends without the  burden of verbal communication.

But for all the good that goes with gadgets in the BYOD era, there is an increased potential for harm.

Inside that non-pleated pant pocket your smartphone might be smuggling a cyber criminal. Here are some tips to keep your smartphone safe and hacker-free.

• Add Security Software

Security Software is just as important for your cell phone as it is for your business or home computer, yet many consumers have no idea that it exists.  SOPHOS has a free app that offers baseline protection for your mobile device.

• QR Codes

From restaurant countertops to business cards, these over-pixelated barcodes are a hacker’s best friend.  In many instances, a QR code is an embedded link to a website—masked so as to be indistinguishable to the naked eye.  How do you know it’s taking you to a safe site? You don’t.  Consider downloading Norton Snap which works as a QR decoder ring, which allows you to decipher the link for safety.

• Turn off automatic Wi-Fi

Continue reading →

Share this:

  • Twitter
  • Facebook
  • Email
  • Print

Like this:

Like Loading...

Macs Don’t get Viruses and 6 other Information Technology Myths

28 Tuesday Jan 2014

Posted by EzFIM in cyberattack, Information Tehcnology

≈ 1 Comment

Tags

antivirus software, Apple, BitTorrent, computer viruses, cyber attack, cyber criminals, ezfim, file integrity monitoring, FIM, Information Technology, Information Technology Myths, IT Myths, Laptops, Macintosh, Macs vs. PCs, Managed Security Service Provider, MSSP, NetBoundary, Nieman Marcus hacked, PCI DSS, social media, Target Hacked, Urban Legends

MythVsRealityYou are probably familiar with a long list of Urban Legends.

Like the one involving Pop Rocks and a soda? Or maybe the one that has nothing to do with candy, but everything to do with a dark road and a dude with a hook for a hand.

Legends, myths and fantasy all make for a great narrative and powerful storytelling, but they should never be taken at face value.

Did you know that even in the world of Information Technology, where logic should reign supreme, there are multiple myths still at play? Here’s a look at some of the most popular.

• Macs don’t get viruses

I’m not sure who started this rumor (probably a Macintosh employee) but  it is far from the truth.  Macbooks and all other Apple computers DO get viruses.

Since most people use PCs rather than Macs, there are  more instances of viruses in non-Mac users. Mac users need antivirus too.

• BitTorrent is illegal

Continue reading →

Share this:

  • Twitter
  • Facebook
  • Email
  • Print

Like this:

Like Loading...

Game Changers: A look back at Top Technological Innovations

06 Monday Jan 2014

Posted by EzFIM in Data Transfer Speed, File Integrity Management

≈ 1 Comment

Tags

Apple iPhone, BlackBerry, ezfim, FIM, Google Maps, GPS, iPhone 5s, Mapsco, MSSP, NetBoundary, Smartphones, TiVO, Xbox, Xbox Live

The dawn of the iPhone put the BlackBerry to bed.

The dawn of the iPhone put the BlackBerry to bed.

The New Year is upon us. Not to worry, you still have (by my count) three weeks to write “2013” on your checks blame-free.

Well, that is, if you still write checks.  Since we don’t know what the New Year will hold for technological advancements, I felt now was the time to wax nostalgic and take a look at some of the most important inventions of the last 15 years.

TiVO (1999)

As a child growing up in the 80s, you could count on three things: 1. Big hair. 2. Bad clothing and 3. Dad consistently complaining about the abundance of advertisements during The A-Team.

But with the rise of TiVO, you could record your favorite shows and skip through commercials! In theory at least. I never could teach Dad how to use the darn thing.

Microsoft Xbox (2001)

Remember when 16-bit video game consoles—such as the Sega Genesis—were all the rage?

“Dude, it looks JUST like the arcade, man!”

Continue reading →

Share this:

  • Twitter
  • Facebook
  • Email
  • Print

Like this:

Like Loading...

The Happy Hacker: Top 5 X-Mas Gifts for the Cyber Criminal

23 Monday Dec 2013

Posted by EzFIM in cyberattack, PCI DSS

≈ 3 Comments

Tags

Anti-Virus, antivirus software, Christmas, Christmas 2013, Credit Card Skimmer, cybercriminal, ezfim, file integrity monitoring, FIM, hackers, Hackers (film), HD TV, MacBook Pro, Managed security service, Managed Security Service Provider, MSSP, NetBoundary, Password Protection, Payment Card Industry Data Security Standard, PCI DSS code compliance, Personal computer, PS4, Target, Xbox One

Hackers don't deserve presents.

Hackers aren’t your friends. Don’t give them gifts.

Christmas is nearly upon us once again.  And just like every year, there are certain items this holiday season that everyone must have.

For many, it is the Xbox One, or PlayStation 4.  Or perhaps a shiny new HD television is tops on your list.

But what does the professional computer hacker hope to find under his/her proverbial tree?

Hackers are human beings too; besides, even those employed in the most nefarious of professions are going to want some sweet new gifts—just like the rest of us.

Here’s a look at some top gifts sure to be high on all hackers’ lists this Christmas.

5.  Credit Card Skimmer

Not all hackers like to work from home. The skimmer first came in to prominence when a waitress used one to swipe customers’ credit card information.  You are in danger anytime your card leaves your hand and is out of sight (or anytime you are shopping at Target.)

4. Your Password

Continue reading →

Share this:

  • Twitter
  • Facebook
  • Email
  • Print

Like this:

Like Loading...

Managed Security Service Provider (MSSP): Saving Your Company Time & Money

02 Monday Dec 2013

Posted by EzFIM in Internet Security, Managed Security Service Provider (MSSP)

≈ 7 Comments

Tags

Computer security, ezfim, file integrity monitoring, Firewalls, Log management and intelligence, Managed security service, Managed Security Service Provider (MSSP), MSSP, NetBoundary, Payment Card Industry Data Security Standard, PCI DSS, Vulnerability (computing)

NetBoundary manages your security 24/7, so you don't have to!

NetBoundary manages your security 24/7, so you don’t have to!

So let’s say that your company has taken every possible precaution for cyberattack prevention.

You’ve integrated the latest firewall, done the necessary penetration and vulnerability tests, and someone is managing the countless logs.

Who is making sure that all of your nifty new IT security devices are functioning normally? Is it you?

I sure hope not. I mean, your job is already hectic enough, and studies show that you should get more than zero hours of sleep a night.

And that, my friends, is just it.  All the greatest gadgets in the world mean zilch if there is no one there to make sure they are all 100% operative, 24 hours a day, seven days a week.  What you need is a Managed Security Services Provider (MSSP), such as NetBoundary.

NetBoundary: Security Managed, Cost Reduced

Every company’s greatest commodity is time.  Less time spent self-managing the infrastructure means more time spent catering to clients, or prospecting for new leads.

An MSSP provides your business with the ultimate asset: time.  Here’s a breakdown of some of the needs that an MSSP caters to:

• Log Management—An absolute necessity that is quite time-consuming.  Any security incident, policy violation or fraudulent activity must be logged to help identify and prevent any future operational issues.

• Firewall Management—Ensures that your firewall is up to date and functioning properly. As your first line of defense, a firewall is useless unless fully optimized.

• Intrusion Prevention/Penetration Management—Hackers don’t work 9-5 like most of us; they look for security breaches all day every day, so you need 24/7 monitoring.

Continue reading →

Share this:

  • Twitter
  • Facebook
  • Email
  • Print

Like this:

Like Loading...

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 391 other followers

EZFIM BLOG POSTS

  • Top 7 Gadget Fails of the last Decade
  • EzFIM Reviews 2014: The Year of the Hacker
  • The Top 5 Hacker Friendly Gifts
  • EzFIM Discusses the Impact of the Great Sony Hack
  • EzFIM Musings: A Reflection on the History of Humanoid Robots

EZFIM BLOG COMMENTS

  • Cyber Security: Is Your Small/Medium Business at Risk? | EzFIM on 5 Tips to Help You Securely Surf the Internet

EzFIM Calender

April 2018
M T W T F S S
« Jan    
 1
2345678
9101112131415
16171819202122
23242526272829
30  

Upcoming Events

No upcoming events

Blog at WordPress.com.

Cancel
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.
%d bloggers like this: