TAP Into Technology Blog: IT Security (18)
How to Identify and Prevent Phishing Attacks
“Garland Technology triumphs in highly-volatile and critical environments, allowing us to provide visibility into our customers information, and help enterprises take proactive action against cyber-attacks.”
How to Monitor Encrypted Traffic and Keep Your Network Secure
It wasn’t too long ago that IT security teams were talking about achieving 20% encrypted traffic. But encryption efforts are quickly gaining traction. Mozilla research found the average volume of encrypted web traffic finally surpassed the...
Halloween Hack: Should SCADA/ICS be Scared?
I’ve been saying for years that supervisory control and data acquisition (SCADA) systems and industrial control systems (ICS) have a greater risk of being hacked. Unless changes and upgrades are made to these mission critical systems, a...
Hijacking Healthcare: Training the Treaters in Cyber Hacks
There’s no denying the dire security situation healthcare organizations are currently facing. However, so much of what you read online or see in the news revolves around specific malware threats or ransomware attacks. What is often missed...
Hijacking Healthcare: Securing Your Smart Devices & Data
When you’re a patient at a hospital, the last thing on your mind is how secure the hospital’s electronic records are. All you want to do is recover. Both patients and staff should be concerned about the safety of digital healthcare...
Dragonfly Power Grid Attacks Hit Home—Now What?
September 2017 has been a bad month for Americans. Here’s what has consumed the news so far: Two catastrophic, physical disasters on US soil—Hurricane Harvey and Hurricane Irma 143 million Americans impacted by the massive Equifax data...