Are you the publisher? Claim or contact us about this channel


Embed this content in your HTML

Search

Report adult content:

click to rate:

Account: (login)

More Channels


Channel Catalog


(Page 1) | 2 | newer

    0 0

    pcm_blog_DetectingServerAttacks

    As it’s not a question of if, but when, a web server will be attacked, early detection and remediation is key. As such, consider these five steps to improve your security’s team ability to detect a web server attack quickly: 1. Inventory and monitor devices. To know if your web server is being or is…

    The post 5 Steps Enhance Detection of Web Server Attacks appeared first on PCM News.


    0 0

    pcm_blog_mitigating_server_attacks

    Eventually, a cyber criminal will attempt to attack your web server. To mitigate the damage they can cause, consider these 4 steps to reduce the impact of server attacks: 1. Implement a data recovery plan. To minimize the damage of an attack, make sure you have a trustworthy data recovery plan, and that you test…

    The post 4 Steps to Reduce the Impact of Server Attacks appeared first on PCM News.


    0 0

    blog_defenseagainstmalware_1200x500_pcm

    As malware continues to threaten organizations across all industries, maintaining and improving defenses against these types of attacks is critical.  To reduce the risk of malware infiltrating your network, consider these 4 steps: 1. Inventory and monitor software. To track when malware infects a system, it is critical to first have a proper and complete…

    The post 4 Steps to Harden Defenses Against Malware appeared first on PCM News.


    0 0

    blog_MALWARE_1200x500_pcm

    Innately slithery creatures, malware often goes undetected. However, in order to adequately defend against malware attacks, it’s imperative to be able to spot them. To enhance detection of malware, consider these six steps: 1. Inventory and monitor network devices. If it’s connected to your network, your security team needs to know what it is. Utilize active…

    The post 6 Steps to Enhance Detection of Malware Attacks appeared first on PCM News.


    0 0

    blog_MITIGATING-MALWARE_1200x500_pcm[2]

    Malware is inevitable. The key is to isolate malware, limit its affect over your organization and users, and remediate it quickly. To reduce the impact of malware attacks, consider these 4 steps: 1. Implement a data recovery solution. To minimize the damage malware can cause, implemented a trustworthy plan for removing all traces of the…

    The post 4 Steps to Reduce the Impact of Malware appeared first on PCM News.


    0 0

    blog_phishingseason_1200x500_pcm

    Although it’s nice to believe our users are all savvy enough to be impervious to phishing attacks, it simply isn’t reality. In fact, according to an EMC fraud report, phishing attacks have been increasing for the last 4 years straight. In 2013, it is estimated that  450,000 phishing attacks resulted in $5.9 billion in losses.…

    The post 2 Steps to Harden Defenses Against Phishing Attempts appeared first on PCM News.


    0 0
  • 10/30/14--09:00: Fishing Out Phishing Attacks
  • blog_fishing-out-phishing_1200x500

    With phishing attacks on the rise every year, it’s critical to spot an attack early to protect your organization and its users. To enhance detection of phishing attacks, consider these 3 steps: 1. Monitor network devices. If it’s connecting to the network, it needs to be inventoried, authorized, and monitored. use active monitoring and device configuration management…

    The post Fishing Out Phishing Attacks appeared first on PCM News.


    0 0

    blog_Mitigating_Phishing_Attacks_1200x500_pcm

    If one of your users or systems falls victim to a phishing attack, it’s important to recover from it quickly to limit the damage it can cause your organization. To reduce the impact of phishing attacks, consider these two steps: 1. Limit and validate administrator access. Protect and validate admin accounts on devices to prevent…

    The post 2 Steps to Reduce the Impact of Phishing Attacks appeared first on PCM News.


    0 0
  • 11/04/14--09:00: Defending Against Bots
  • blog_rubots_1200x500_pcm

    Are you a human? If so, then you’ve undoubtedly filled out your fair share of CAPTCHAs, squinting to determine if the character depicted is a lowercase “l” or an uppercase “I,” or some other vague character. As much as CAPTCHA systems are annoying, they are needed. In a world where bots continually attempt to mine…

    The post Defending Against Bots appeared first on PCM News.


    0 0
  • 11/06/14--09:00: Detecting Bots
  • blog_detecting_bots_1200x500_pcm

    Inevitably, a bot will attempt to gain access to your network. To minimize the damage it can do, it’s crucial to detect it early. To improve your ability to detect bots, consider these 3 steps: 1. Monitor devices on your network. If it’s connected to your network, you need to know about it. Reduce the ability…

    The post Detecting Bots appeared first on PCM News.


    0 0
  • 11/11/14--09:00: Mitigating Bots
  • blog_mitigating_bots_1200x500_pcm

    Inevitably, a bot will attempt to take advantage of your network. To minimize the damage it can cause, consider these three steps: 1. Implement boundary defenses. To minimize the damage a bot can cause, you must fist limit its access through multi-layer boundary defenses. This will allow you to control the flow of traffic through…

    The post Mitigating Bots appeared first on PCM News.


    0 0

    holiday_gadgets_blog_1200x500

    Holiday Gadgets: A Gift to Hackers? Protect your digital life this holiday season. With the holiday season quickly approaching, gift-givers are rushing to purchase the latest tech gadgets. Whether you give or receive a tech gift this holiday season, it’s important to ensure its security, as it could be on Intel Security’s 2015 “Most Hackable…

    The post Most Hackable Holiday Gifts 2015 appeared first on PCM News.


    0 0

    As it’s not a question of if, but when, a web server will be attacked, early detection and remediation is key. As such, consider these five steps to improve your security’s team ability to detect a web server attack quickly: 1. Inventory and monitor devices. To know if your web server is being or is…

    The post 5 Steps Enhance Detection of Web Server Attacks appeared first on PCM News.


    0 0

    Eventually, a cyber criminal will attempt to attack your web server. To mitigate the damage they can cause, consider these 4 steps to reduce the impact of server attacks: 1. Implement a data recovery plan. To minimize the damage of an attack, make sure you have a trustworthy data recovery plan, and that you test…

    The post 4 Steps to Reduce the Impact of Server Attacks appeared first on PCM News.


    0 0

    As malware continues to threaten organizations across all industries, maintaining and improving defenses against these types of attacks is critical.  To reduce the risk of malware infiltrating your network, consider these 4 steps: 1. Inventory and monitor software. To track when malware infects a system, it is critical to first have a proper and complete…

    The post 4 Steps to Harden Defenses Against Malware appeared first on PCM News.


    0 0

    Innately slithery creatures, malware often goes undetected. However, in order to adequately defend against malware attacks, it’s imperative to be able to spot them. To enhance detection of malware, consider these six steps: 1. Inventory and monitor network devices. If it’s connected to your network, your security team needs to know what it is. Utilize active…

    The post 6 Steps to Enhance Detection of Malware Attacks appeared first on PCM News.


    0 0

    Malware is inevitable. The key is to isolate malware, limit its affect over your organization and users, and remediate it quickly. To reduce the impact of malware attacks, consider these 4 steps: 1. Implement a data recovery solution. To minimize the damage malware can cause, implemented a trustworthy plan for removing all traces of the…

    The post 4 Steps to Reduce the Impact of Malware appeared first on PCM News.


    0 0

    Although it’s nice to believe our users are all savvy enough to be impervious to phishing attacks, it simply isn’t reality. In fact, according to an EMC fraud report, phishing attacks have been increasing for the last 4 years straight. In 2013, it is estimated that  450,000 phishing attacks resulted in $5.9 billion in losses.…

    The post 2 Steps to Harden Defenses Against Phishing Attempts appeared first on PCM News.


    0 0
  • 10/30/14--09:00: Fishing Out Phishing Attacks
  • With phishing attacks on the rise every year, it’s critical to spot an attack early to protect your organization and its users. To enhance detection of phishing attacks, consider these 3 steps: 1. Monitor network devices. If it’s connecting to the network, it needs to be inventoried, authorized, and monitored. use active monitoring and device configuration management…

    The post Fishing Out Phishing Attacks appeared first on PCM News.


    0 0

    If one of your users or systems falls victim to a phishing attack, it’s important to recover from it quickly to limit the damage it can cause your organization. To reduce the impact of phishing attacks, consider these two steps: 1. Limit and validate administrator access. Protect and validate admin accounts on devices to prevent…

    The post 2 Steps to Reduce the Impact of Phishing Attacks appeared first on PCM News.


(Page 1) | 2 | newer