Blog
Alert icon

Identities and Vulnerabilities 

The Cybersecurity and Infrastructure Security Agency (CISA), a part of the Department of Homeland Security, has issued Analysis Report (AR20-268A) on Thursday September 24th, 2020. The report states that CISA became aware of a potential compromise of, as of now, an unnamed federal agency’s network. Through collaboration with the affected agency, CISA was able to […]

Alert icon

ALERT: Citrix ADP, Gateway and SD-WAN WANOP Vulnerabilities

Citrix published Security Bulletin CTX276688 on July 7, 2020 covering vulnerabilities recently discovered in Citrix ADC (formerly known as Netscaler ADC), Citrix Gateway (formerly known as Netscaler Gateway) and  SD-WAN WANOP. The vulnerabilities have been identified, with an increased risk of systems compromise and information disclosure, as well as the potential for unauthorized privilege elevation, […]

Managed Services and regular patching prevents hacker attacks

Hacking Surges During Pandemic – Are Your Systems Prepared?

There’s not a more important time than now to ensure you’re protecting your systems from security threats. Hackers are taking advantage of the transition that many organizations are making to remote work forces during this pandemic. The World Health Organization (WHO) Chief Information Security Officer, Flavio Aggio, told Reuters in March, “There has been a […]

SD-WAN illustration

SD-WAN – The next generation of networking has arrived!

Today’s customers expect a digital, seamless experience no matter where they are or what device they are using. Everyone talks about providing innovative experiences to stay competitive, but how do you deliver them? To complicate things further, IT departments are under pressure to do more with less: manage more sites and more clients with limited […]

Shadow IT – What You Need To Know

Shadow IT – What You Need To Know

When I first heard the term “Shadow IT”, I had just finished watching Batman Begins, so the first thing that came to mind was a group of super villainous techies working for the League of Shadows, trying to collapse society one network at a time. The true definition of Shadow IT isn’t  anywhere near as […]

How to Protect Your Data From Ransomware Using a Virtualized Approach

How to Protect Your Data From Ransomware Using a Virtualized Approach

The saying goes, It’s not a matter of ‘if’ but ‘when.’ That saying holds true when it comes to the IT world and security. After all, the health and success of your organization depends on security! High-profile breaches, malicious insiders, phishing emails… the list goes on. No organization is 100% immune to the variety and […]

EDCi Announces Managed Security Services Partnership With RedLegg

EDCi Announces Managed Security Services Partnership With RedLegg

  Appleton, WI – December 6, 2017–  EDCi, a full-service technology and communication solutions provider has announced a partnership with RedLegg, a global provider for managed and cybersecurity services. RedLegg provides a Channel Partner Program with comprehensive advisory solutions for real-world data protection and security challenges. Three core service offerings are Advisory which includes, Virtual […]

Why Firewalls Need Constant Refreshing… And Having Your Engineers and Your Business Take Ownership!

Why Firewalls Need Constant Refreshing… And Having Your Engineers and Your Business Take Ownership!

I had a discussion recently with a customer regarding firewall “ownership”.  Not which group owns the firewall (typically network, firewall or security) but actually taking ownership of the access rules within the firewall.  Sounds pretty boring, huh? Perhaps, but it is one of the most critical components your company can have in a layered security […]

How Adam Sandler Can Enlighten Us on Risk Management

How Adam Sandler Can Enlighten Us on Risk Management

Feeling a touch nostalgic last night, I listened to Adam Sandler’s 1993 comedic album, “They’re All Going to Laugh at You”.  The title purportedly comes from a repeated phrase in the 1976 horror movie Carrie. On the album, Sandler’s character keeps screaming, “Nooooo!! They’re all going to laugh at you!!” much to the anger and […]

Why A SIEM Platform is Critical to Every Organization

Why A SIEM Platform is Critical to Every Organization

One of the most intensive and time consuming processes that any security engineer tackles is trying to put together the pieces of an attack lifecycle. From the endpoint analysis to the detection capabilities on the network devices, tracing an incident throughout your organization requires advanced technical skills and a solid methodology from the security analyst.  […]