Tag threat surface

8 ways to avoid cyber security alert fatigue and false positives

New studies are tracking the increasing hours that cyber security pros spend researching and responding to security alerts. Hint: false positives make up a big %. Read about how Field Effect Covalence provides purpose-built monitoring and alerting that provides detailed yet easy to understand analysis that saves time and results in fast action

Are Your Video Conferencing Sessions Secure?

Zoom: The anatomy of vulnerability detection and response – Zoom’s recent vulnerabilities enabled potential attackers an easy way to gain access to users’ computers by remotely taking over their computer webcams and initiating video-enabled calls on devices without user consent.

The Threat Surface

The cyber security threats facing your business today are constantly changing, along with your network as new software, hardware, and user activity are introduced. All of these factors present an ideal scenario for a cyber attack. Understanding your threat surface – the set of all parts of your network where vulnerabilities and threats could lead to access by unauthorized users – is a critical step to improving your network security posture.

Domain Name System (DNS) Security

We recently partnered with the Canadian Internet Registration Authority (CIRA) with the shared goal of continually improving the security services we offer you.

The first outcome of teaming with CIRA is already a reality: advanced monitoring and protection for your network’s Domain Name System (DNS).  With CIRA’s extensive DNS footprint and proven DNS firewall service, we can provide a better defense for your network through stronger security and increased visibility.

Are Your Mobile Users Protected?

Are Your Mobile Users Protected? With the vast amount of corporate and personal data on smartphones and tablets today, mobile devices have quickly become attractive targets for cybercrime. As attacks increase year over year, how do you protect the security of mobile users on your network? Keeping mobile users safe and networks secure are critical […]