Tag Archives: Information Security

Windows 7 & Server 2008 – Time to Upgrade

The end of 2 beloved and notorious operating systems Microsoft Windows 7 & Server 2008 R2 is upon us. As of January 2020, Windows 7 and Windows server 2008 will no longer be supported. Much like you may remember the end of life for Windows… Continue reading

Why You Need HTTPS on Your Website

Most any web user can tell you when they visit a website that uses HTTPS. They know this by the green lock in browser or the HTTPS (vs. HTTP) in the address bar. This indicates that you can generally trust your connection to the site… Continue reading

Social Engineering Examples

Social engineering is a threat that faces organizations from small business to large enterprises. As we’ve explored multiple times on this site, there are few organizations that are truly prepared to address these types of threats. Social engineering attempts to coax, cajole, and manipulate others… Continue reading

Why Security Awareness Training

Enterprises invest in all the latest security technologies but often neglect an absolute fundamental component of information security – end users. Organizations can employ the best technology practices of next generation firewalls, anti-malware and intrusion prevention system. Corporations these days understand security should be ‘baked… Continue reading

WannaCry Ransomware – 5 Lessons Learned

Unfortunately malicious software is an everyday occurrence. As of Friday May 12th a massive ransomware attack dubbed WannaCry infected over 230,000 Windows computers in over 150 countries. It’s spread was fast and furious. WannaCry ransomware held the victims computer/data for ransom by encrypting it. Among… Continue reading

Addressing the Insider Threat

Technology is a powerful tool in assuring the confidentiality, availability and integrity of your critical data – but it is no failsafe. Even the best of breed technology deployed in a layer approach (defense in depth) will have flaws. The most well meaning and resourced… Continue reading

Protecting Against Malicious USB

If you found a random USB device what would you do with it? Would you be curious and plug it into your computer to find what juicy secrets it holds? Or would you leave it where you found it? Most often, unsuspecting, ill-informed users take… Continue reading

Is Your Email HIPAA Compliant

Most health care providers and medical practices understand the basics of HIPAA compliance but often miss critical technical or operational details that leave them out of compliance. These technical details are far from inconsequential. Take the example of email. Many health care organizations (covered entities)… Continue reading

IoT Nightmare – Promise and Risk

Today there are 9 billion devices connected to the Internet. As we move forward to a day where most devices will be Internet connected this growth trend will not subside. The day of IoT (Internet of Things) is upon us. IoT are takes what were… Continue reading

GFI – New Software Partnership

We are proud to welcome the award-winning, affordable software solutions from GFI to the Evolutionary IT family of offerings. GFI specializes in small to mid-sized businesses software solutions in web and mail security, archiving, fax, networking and security software. They offer both on premise and… Continue reading