RSA Preview: The Many Challenges of IT Security and How MSSPs Can Help

This year’s RSA Conference is expected to draw close to 50,000 security professionals to the Moscone Center in San Francisco. So we’re wondering, what issues are keeping them up at night? On the eve of RSA, we wanted to address some of the biggest challenges we see IT security teams are facing. The sessions at this […]
It’s 2017 – Are You Ready? The Evolution of Cybercrime

If 2016 taught us anything, it’s that we can expect to see an uptick in cybercrime and malicious cyber activity across all industries in 2017 – and an increase in incidents every year thereafter for the foreseeable future. The Evolution of Cybercrime The last few years have given cybersecurity professionals a stark glimpse into how […]
Using SIEM Technology to Streamline HIPAA Compliance

There are 154 separate risks underlying the HIPAA compliance security standard. Addressing and continually monitoring each of these risks individually can be an enormous task for a security officer. SIEM technology allows most of these risks to be identified, addressed and monitored for complete HIPAA compliance. SIEM Technology and HIPAA Compliance SIEM technology allows for […]
Black Friday Threats

Targeted threats against shoppers and retailers alike are on the rise, especially with Black Friday coming up. As the volume of shopping increases for the 2016 holiday shopping season, shoppers need to arm themselves with knowledge regarding account takeovers targeting their bank information using Phishing, Smishing, Spam and Malvertising methods. Retailers also need to be […]
Correlation, Detection, and Alerting in Real-Time for Active Directory
Imagine how much damage a hacker could do by compromising your Active Directory. Active Directory, which is used by an estimated 95% of Fortune 5000 companies, forms the core services for security and permissions management. It allows IT administrators to configure permissions through one console to ensure their users and computers align with their company’s […]
Tips for Email Security

May 5th, 2016 is World Password Day – a day created to encourage safe password practices. The best defense against external threats is staying informed and diligent with your security practices, especially when it comes to email security. Here are some tips to help stay safe from email threats: Never share your password. If someone […]
Annual Cybersecurity Survey Reveals Challenges for 2016

2015 was a tough year for data breaches. Companies of all sizes and industries fell victim to hackers, costing billions of dollars and harming the reputations of many organizations. So what is in store for 2016? Will cybercriminals continue to find new ways to get onto networks or will enterprises be prepared to prevent damaging […]
Increased Risk of Foreign Cyber Attacks

In April, we alerted customers that hackers are planning to use zero day exploits to take over unpatched Windows XP machines and use them as botnets in coordinated DDOS attacks. This cyber attack alert discusses a new threat that is also related to Windows XP vulnerabilities. According to our sources, government agencies believe the current […]
Data Privacy Day 2016

Today, January 28th, is Data Privacy Day. Data Privacy Day (DPD) is part of the #PrivacyAware campaign, which reminds businesses of the importance of data security within their organization. As a DPD Champion, we’re working towards the common goal of improving consumer and business consciousness while also encouraging and empowering people to be more aware […]
Five Use Cases of Behavioral Analytics to Protect Customer Networks
Interest in user and entity behavioral analytics, or UEBA as recently coined by Gartner, has risen dramatically over the past 12 months. And it’s for valid reasons. Attackers are using more and more sophisticated approaches to bypass traditional defense mechanisms. Companies are constantly looking for enhanced solutions to protect their users and valuable assets, but […]
The Importance of Controls for MSSPs

Should Your MSSP be SOC 2 Compliant? SOC stands for Service Organization Controls and falls under the Statement on Standards for Attestation Engagements (SSAE) No. 16. SSAE 16 was issued by the Auditing Standards Board of the American Institute of Certified Public Accountants (AICPA) in 2010. SSAE 16 effectively replaces SAS 70 as the authoritative […]
Medical devices growing concern in healthcare IT security

Practically every hospital and healthcare institution invariably depend upon medical devices. These devices produce a sizable amount of data and despite the fact that very little of this data is retained for any longitudinal patient benefit, the data must be safeguarded per federal requirements. Proficio’s security engineers have worked with a number of healthcare IT […]