<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2019184968353592&amp;ev=PageView&amp;noscript=1">

IT Solutions Blog

Attack Surface Management: Designing a Robust Program in Seven Steps

Posted by Jacob Haynes

Our goal as cyber-defenders is to look at our organizations from the cyber-attacker’s viewpoint, reduce the attack surface, and reduce the impact of a cyber-attack. Here are seven important steps to include in your Attack Surface Management program:


Read More

5 Effective Ways to Increase Data Security

Posted by Solutions II

Hackers show no signs of abating their attacks on businesses. The data that businesses generate is just too valuable for cybercriminals to ignore.

Read More

Insider vs. Outsider Data Security Threats: Are you taking risks?

Posted by Solutions II

Whether insiders or outsiders pose a greater threat to security is a matter of ongoing debate. According to Verizon’s 2018 Data Breach Investigations Report, 73% of cyberattacks were executed by outsiders and 28% of attacks involved insiders. 

Read More

Social Media Vulnerability

Posted by Solutions II

As businesses embrace the digital information age and the diverse tool sets to engage with the community many have found these very tool sets can be a double edged sword with potentially devastating effects. Remember when HBO had sensitive information regarding one of its hottest shows Game of Thrones find its way onto Twitter?? Today businesses have to ensure that the channels with which they operate are as locked down as their data repositories are.

Read More

Educate Employees on Avoiding Security Breaches

Posted by Solutions II

It’s a truism that educating employees is one of the most important steps to preventing security breaches in the workplace. In fact, one survey found that two thirds of the professionals charged with data protection and privacy training point to employees as the largest source of failure in corporate IT security measures.

Read More

What You Need to Know About "Spectre" and "Meltdown"

Posted by Solutions II

In recent days, you have most likely seen news stories about the "Meltdown" and "Spectre" vulnerabilities in many modern processors. Solutions II is aware of these issues, and we are watching the situation closely as we work with our partners to help you formulate the best plan of action to safeguard your infrastructure.

Read More

Something Looks Phishy

Posted by Solutions II

Earlier this month, an investigation by the FBI’s Cyber Task Force in partnership with the Washtenaw County Sheriff’s Office and the Michigan State Police, led to Konrad Voits (27) guilty plea to damaging a protected computer within Washtenaw County government computer system. Voits’ motive focused on altering computer records of an inmate in an effort to get that inmate released early. The fact that Voits succeeded in altering a government computer system is astonishing. The thought that it can happen to your organization is terrifying! How does this happen and more importantly, what can you do to ensure your organization and IT architecture is better prepared to handle these types of threats!

Read More