October 09, 2020
Cybersecurity Fundamentals: 5 Key Ways to Keep Hackers Out
With all the changes to organizational work-life and the increasing exposure to risks, you can never be too careful with your cybersecurity processes. When it comes to keeping your data and sensitive information safe, a reminder of some security fundamentals for risk mitigation is always in order as we can sometimes lose site of the […]
Read more
August 25, 2020
Foundation for Secure Remote Access, Especially Third-Parties
The need for secure remote access continues to grow as we still battle the impact of Covid-19 on business operations. Without a real end in sight, we can no longer rely on our rapidly deployed solutions as long-term options without re-evaluating our security posture. When this unprecedented pandemic occurred, businesses had to adapt quickly to sustain operations. […]
Read more
March 04, 2020
Technological Impacts of Coronavirus: Is Your Environment Prepared?
You have probably heard of this interesting virus affecting people in other countries. However, have you considered the organizational impact Coronavirus may already have on your business today? What about when, not if, it proliferates in the United States? All major publications and news outlets – the New York Times, The Wall Street Journal, CNBC, […]
Read more
October 25, 2019
Teachable Moments in IT
An article caught my eye this week. It involves the unfortunate circumstances in the city of Baltimore, but it’s a valuable lesson to any organization (link below). In short, a combination of ransomware and poorly managed backups wreaked havoc on the City of Baltimore. The unfortunate situation is a good reminder of how the best […]
Read more
August 02, 2019
Avoiding the Capital One Breach: Defense in Depth
With the release of the criminal complaint in the recent Capital one breach we now have a better understanding of how Paige A. Thompson exfiltrated data from their cloud vendor. We don’t know all the details and can only make inferences based upon the information available. Deploying CloudGuard on AWSCase Study The complaint states that a GitHub file was […]
Read more
July 30, 2019
VxWorks Vulnerabilities: More Exposure Than You Think
Six of the URGENT/11 bugs can be exploited to achieve remote code execution (RCE). At least one bug affects each version of the OS starting with 6.5, while others can lead to a denial of service (DoS) attack. Well, while this is something you may not have heard of it is the real time operating system […]
Read more
July 23, 2019
Your Password Policy Should Challenge Hackers, Not Your Users
Any time a human is involved, the potential for weakened security increases. Password policies are necessary for cybersecurity compliance; however, burdensome password policies can result in bad user behavior like password transformation. SUBSCRIBE TO SAYERS BLOG REMEMBER WHEN – IBM published the startling statistic that human error was found to be involved in 95% of all security incidents in “2014 Cyber […]
Read more
March 17, 2019
Install of Cloud Firewall into AWS Meets Tight Deadline
Sayers Professional Services Enables Cloud Security Sayers Defines and Secures Virtual Network leveraging AWS and Check Point CloudGuard Technology Recently a medical group purchased Check Point cloud firewalls. When their existing partner couldn’t handle the implementation, Sayers stepped up for the assist. The Project Management and Engineering Teams immediately worked with the client to get a clear understanding of […]
Read more
February 03, 2019
Firewall Rule Review is Key to Optimizing Security Investment
New gear isn’t an answer to all problems. Sayers completed a firewall ruleset review and discovered purchasing additional equipment wouldn’t help resolve the client’s pain points. When a system of regional banks across America faced firewall issues, they turned to Sayers to find out what they should do next. Why Sayers? Sayers has experience helping clients […]
Read more