TAP Into Technology Blog: IT Security (18)
See Threats in Real Time with 100% Visibility
Network security becomes increasingly complex with each passing day, making it critical that busy security teams have full visibility and threat detection capabilities. These resource-constrained teams already support a wide range of...
How to Identify and Prevent Phishing Attacks
“Garland Technology triumphs in highly-volatile and critical environments, allowing us to provide visibility into our customers information, and help enterprises take proactive action against cyber-attacks.”
How to Monitor Encrypted Traffic and Keep Your Network Secure
It wasn’t too long ago that IT security teams were talking about achieving 20% encrypted traffic. But encryption efforts are quickly gaining traction. Mozilla research found the average volume of encrypted web traffic finally surpassed the...
Halloween Hack: Should SCADA/ICS be Scared?
I’ve been saying for years that supervisory control and data acquisition (SCADA) systems and industrial control systems (ICS) have a greater risk of being hacked. Unless changes and upgrades are made to these mission critical systems, a...
Hijacking Healthcare: Training the Treaters in Cyber Hacks
There’s no denying the dire security situation healthcare organizations are currently facing. However, so much of what you read online or see in the news revolves around specific malware threats or ransomware attacks. What is often missed...
Hijacking Healthcare: Securing Your Smart Devices & Data
When you’re a patient at a hospital, the last thing on your mind is how secure the hospital’s electronic records are. All you want to do is recover. Both patients and staff should be concerned about the safety of digital healthcare...