Skip to content

Archived Cybersecurity Blogs

How AI and machine learning in cybersecurity bolster your defenses

Cybersecurity is front-page news, and its impacts are considerable. Consider that NBC News recently called ransomware “a major national security issue.” The same story says that the cybersecurity industry is stretched thin, with a shortage of workers to help stem the damage. The FBI 2020 Internet Crime Report shows how big the problem is, with the bureau’s Internet Crime Complaint Center receiving a record 791,790 complaints last year, with reported losses exceeding $4.1 billion. And today’s headlines make it clear that it’s only getting worse.

Jon Bolden

5 critical ways you can help prevent a DDoS attack (and recover faster)

While all cybersecurity threats are on the rise, one form of attack has a long history of wreaking havoc. The first-ever distributed denial of service (DDoS) attack in 1974 was the work of a 13-year-old student. In 1996, DDoS was first used as a commercial weapon when New York-based internet service provider Panix was targeted by a hacker using a spoofed IP address to overwhelm the company’s servers with fake “synchronize” packages. These early DDoS attacks function much like the modern versions, shutting down your network, servers, or sites by sending vast amounts of data that overwhelm targeted systems.

Jon Bolden

Understanding the Stages of Incident Response in the Cybercrime Era

Cybersecurity threats are coming at organizations from everywhere. Lately, ransomware has been headline news as JBS, the largest global beef supplier, paid $11 million to the Russian hacker group REvil after they breached the company’s networks. Unfortunately, ransomware attacks are becoming even more sophisticated. Some recent attacks find their way into networks and exfiltrate the data, essentially stealing it, then threatening to either sell it on the dark web or publish it elsewhere unless the victim pays the ransom.

Jon Bolden

Why the SASE Security Model Makes Sense in Today’s Environment

Security is certainly front of mind for anyone involved with IT today. That’s why many companies have adopted stronger and stronger measures to prevent successful cyberattacks. That typically means having end users—those working both remotely and in the office — access all their data via a backhaul connection through a virtual private network (VPN). This approach lets users take advantage of the organization’s firewall, filters, and other security measures. But while users may be able to access the resources, they need this way—whether that’s SaaS applications or files—there are probably still plenty of gaps that exist in your security fabric.

Jon Bolden

Why You Need 6 Layers of Zero-Trust Control

A recent report produced for IBM put the average cost of a data breach at $3.86 million. The same report said that simply having a remote workforce added nearly $137,000 to the cost of data breach resolution. Those are big numbers. And, with today’s migration to a remote workforce, that should be plenty of motivation for those responsible for their organization’s data security to take notice.

Jon Bolden

How to Secure Your Network for Every Endpoint

Endpoint security has become more complex than ever before, creating new challenges for today’s businesses. If you were asked to identify every endpoint on your network, how long would it take you? And would you be able to confidently say that each and every endpoint was properly secured?

Jon Bolden

Contact Quest Today  ˄
close slider