May 6, 2021 | Rupesh Chokshi

Password security tips and best practices for enterprises

In honor of World Password Day, we’re doing our part to help keep your business secure by discussing the good, the bad, the ugly and the critical about passwords. Let’s face it: between all the logins we need for work and all the accounts we use in our personal lives, there are too many passwords to…

May 5, 2021 | Theodoros Karasavvas

5 IT security strategies that you should think about as employees return to the office

This blog was written by an independent guest blogger. Without a doubt, digital transformation accelerated amid the pandemic and made it possible for employees to work remotely. However, it also intensified the threat landscape created by malicious attackers who jumped on the first opportunity to attack the more vulnerable home networks. As remote working becomes the new norm, it is…

May 4, 2021 | Rakesh Shah

New Advanced AlienApps for Fortinet

Here at AT&T Cybersecurity, we feel strongly that security should fit into your business, not the other way around.  We lower the friction security brings to day-to-day operations through automating the essential security operations such as detection and response.  By integrating different security products together to form a consolidated security architecture, companies can be protected with…

May 3, 2021 | Chris Mark

The new normal is actually very normal:  Punctuated equilibrium, security cycle theory, and the “New Normal”

In 2020, the world was hit with an unexpected pandemic that changed much of life as many had come to know it.  Virtually overnight, masks were required, employees were working remotely, children were home from school, and businesses were locked down to stop the spread of Covid19.  In reading the news and social media the term “The New…

April 29, 2021 | Silvana Carpineanu

The importance of creating a small business Cybersecurity plan

This blog was written by an independent guest blogger. It’s estimated that cyber crime will cost businesses as much as $45,000,000,000 by 2025. Each year, small businesses who haven’t put a cyber security plan in place are at the mercy of hackers who are using ever increasingly sophisticated methods to breach their network, compromise their data -…

April 28, 2021 | David Bisson

What Docker runtime deprecation means for your Kubernetes

This blog was written by an independent guest blogger. On December 8, 2020, Kubernetes released version 1.20—the third and final release of the popular container orchestration platform in 2020. Kubernetes noted in a blog post that the version contained 42 enhancements. Of those enhancements, 16 entered into alpha, while the remainder moved to beta or graduated to stable at 15 and 11, respectively. That’s…

April 27, 2021 | Zachary Curley

Priority on people - An argument against the excessive use of Cybersecurity technology

Introduction Despite what many advertisements and salespeople would like you to think, you don’t need to (and in many cases shouldn’t) spend a fortune on security tools to achieve a robust cybersecurity program. Some tools are essential, such as a ticketing tool or Security Information and Event Management (SIEM) system, but the best security programs are…

April 26, 2021 | Devin Partida

The 5 most crucial Cybersecurity updates for businesses in 2021

This blog was written by an independent guest blogger. For as long as businesses have used computers, cybersecurity has been crucial. Now, as modern business and data are becoming inseparable, it’s an absolute necessity. As companies start to recover from 2020 losses, they should consider investing in security updates. Cybercrime reached new heights in the past year, with internet…

April 23, 2021 | Kyle Chrzanowski

Lessons learned from building an inventory of systems

IT asset inventory vs an ISI – What’s the difference?  Many frameworks, standards, and regulations require organizations to have an IT Asset Management program in place. However, the understanding of what separates a mature Information System Inventory (ISI) from an IT Asset Inventory and the benefits realized from an ISI are generally less well understood. Naturally this…

April 21, 2021 | Karoline Gore

Bridging the Cybersecurity frontier: SaaS

This blog was written by an independent guest blogger. Software as a service (SaaS) is one of the most important parts of the modern digital business. Unfortunately, when it comes to cybercrime, it can also be one of the weakest. The Cybersecurity newsletter, The Hacker News, have highlighted this in detail, noting interest from across the digital industry in…

April 20, 2021 | Rupesh Chokshi

Best practices for businesses to stay safe online this tax season

It’s tax time again. Typically, the deadline for federal tax filing in the United States is April 15, but this year the deadline has been extended to May 17, 2021. However, if you think your business will be receiving a refund, the IRS encourages you to file as early as possible. Filing taxes can be stressful. Adding to the potential stress…

April 19, 2021 | Rakesh Shah

Introducing AT&T’s Managed Endpoint Security with SentinelOne

With 5G, edge solutions, and digital transformation all around us, every enterprise should be taking a closer look at their endpoint security and evaluate options that will be able to keep pace with this dynamic new environment.The newly introduced  AT&T Managed Endpoint Security with SentinelOne™ offer brings world class managed services with comprehensive…