“Cybersecurity touches every part of an organization, and misconceptions around cybersecurity can put your company at risk” – Andrew Loschmann. President & Chief Technology Officer, Field Effect Software
Zoom: The anatomy of vulnerability detection and response – Zoom’s recent vulnerabilities enabled potential attackers an easy way to gain access to users’ computers by remotely taking over their computer webcams and initiating video-enabled calls on devices without user consent.
The cyber security threats facing your business today are constantly changing, along with your network as new software, hardware, and user activity are introduced. All of these factors present an ideal scenario for a cyber attack. Understanding your threat surface – the set of all parts of your network where vulnerabilities and threats could lead to access by unauthorized users – is a critical step to improving your network security posture.
Ottawa – June 5th, 2019 – Today, CIRA is proud to take another step in protecting Canadian small and medium-sized business from cyber threats with the announcement of the first API integration as part of its D-Zone Partner Program. Field Effect Software will be integrating D-Zone DNS Firewall into its Covalence threat detection, incident monitoring, and analysis solution to provide an extra layer of defense for its customers.
We recently partnered with the Canadian Internet Registration Authority (CIRA) with the shared goal of continually improving the security services we offer you.
The first outcome of teaming with CIRA is already a reality: advanced monitoring and protection for your network’s Domain Name System (DNS). With CIRA’s extensive DNS footprint and proven DNS firewall service, we can provide a better defense for your network through stronger security and increased visibility.
Are Your Mobile Users Protected? With the vast amount of corporate and personal data on smartphones and tablets today, mobile devices have quickly become attractive targets for cybercrime. As attacks increase year over year, how do you protect the security of mobile users on your network? Keeping mobile users safe and networks secure are critical […]