ThrottleNet Inc. Blog


Debunking Common Cyber Security Myths Believed by CEOs

Alongside ensuring the day-to-day elements of their business are running successfully, CEOs hold a big responsibility in maintaining the security of their network.

How they handle network security and delegate responsibilities to maintain it are often based on their own beliefs about technology and how it relates to security. Unfortunately, while all CEOs have the best intentions and believe their organization is doing everything it can to counter cybersecurity concerns some of these beliefs miss the mark and leave their organization open to vulnerabilities.

In this article, we bust some of these cyber security myths and discuss the truth about each belief.

Read the rest of entry »

A Lesson in Wi-Fi Router Security: How to Secure Your Wi-Fi Environment

Earlier this month the FBI put out a call to all internet users: Reboot your router! Now, they’re asking consumers to do a little more, by updating router firmware and doing a full factory reset. 

The cries for action come after it was discovered that Russian hackers infected over half a million consumer routers with a malware known as VPNFilter, which performs a “man in the middle” attack on incoming web traffic. Experts are still trying to determine exactly what VPNFilter can do, but we know that it can modify the content delivered by websites, steal credentials and even issue a self-destruct command. 

To infiltrate the routers, hackers took advantage of known exploits or default credentials that come pre-packaged with each device, making the attack simple to carry out.

Read the rest of entry »

The Important Questions to Ask When Hiring an IT Consultant

Interview the Consultant

More and more companies are hiring an IT consultant to keep up with the ever-changing technology landscape. By 2022, the cyber-security field is expected to rise exponentially, from a $137 billion industry today to $232 billion. Cyber-security experts are being relied on because decision makers are becoming more aware of the impact a potential breach can have on their organization.  There are greater needs for compliance with industry standards and importance of the cloud for streamlining operations.

When hiring an IT consultant, decision makers need to ask their prospective vendor these questions, and be satisfied with their answers before making a commitment.

Read the rest of entry »

How to Compromise Between Corporate & Personal Security with Your BYOD Policy

For bring-your-own device initiatives to work, data security must be ensured while respect is given for employee privacy. 

Installation of an MDM on a personal device is optional in most companies – but so is being able to use your personal devices for work. You can’t BYOD without the MDM.

The juggling act of personal privacy vs. corporate privacy is tough for many end-users to take – and honestly, who can blame them?

Read the rest of entry »

Know the Risks of Chrome Extension Malware and How to Protect Yourself

According to a report released earlier this month, more than 100,000 Google Chrome users were affected after downloading malware from browser extensions in the official Chrome Web Store.

The chrome extension malware attack was created by crisis actors who had hijacked legitimate browser extensions, most commonly an app called “Nigelfly” which replaces pictures with the face of cartoon character Nigel Thornberry (whom we have never heard of before this) with malicious scripts. By taking advantage of existing apps in the Chrome store, the hackers could bypass Google’s extension validation checks. Along with Nigelfly, at least 7 other apps were used during the scheme, and Google has been able to remove several of these apps from the Chrome store.

Read more about the risks of Chrome extension malware and how to protect yourself.

Read the rest of entry »

A Case for Partial IT Outsourcing: Supplementing Your Team with Managed Services

Integrating managed services into an organization does not have to be a fully-outsourced solution. More and more organizations are turning to managed network providers for partial IT outsourcing even if they currently have and wish to continue to have an internal team managing aspects of their information technology.

A reliable managed network partner can seamlessly work as a supplement to your existing IT team, helping monitor your infrastructure, manage security requirements and help resolve any everyday incidents that may occur.

Discover 5 reasons why companies who intend to continue managing IT in-house can still benefit from partial IT outsourcing with a Managed Network provider.

Read the rest of entry »

Time to Check Out The Fitbit Versa

By George Rosenthal

Fitbit has launched its new watch, the Versa. Priced at around $199, the Versa is designed to compete with the Apple Watch, and at its core, it does just that. The Versa performs well as a smart watch as well as a fitness tracker. It works with Apple, Android and Windows devices.

The watch features Fitbit Today so you can check your daily health statistics and check them against your goals. There are also guided move reminders and breathing sessions. Fitbit fans will notice the Versa has a different look than the older and more expensive Ionic. It has a wider, square face with metal finishes. It is sleeker and thinner than the Apple Watch and comes with a standard rubber band with more strap options.

The touch screen is more responsive than the Ionic. There are three buttons to handle shortcuts for music controls, notifications, exercise start times and alarms. All buttons are customizable to your individualized preferences.

Read the rest of entry »

Is Your IT Security Training Effective Enough?

Educating end users on the importance of security within your organization is an up-hill battle for most small businesses. Ask an IT professional how effective their training processes are and you’re sure to get a mixed bag of responses.

Some things work for some people and don’t for others.

Mandatory, irregular IT security training seminars don’t always make a connection. Hosting half day or day long training sessions can bore people to death and cut into your bottom line by pulling employees away from their workstations for an extended period. It security training Presentations need to walk a fine line between presenting hard policies and detailing the repercussions of violation while being lighthearted and keeping the room interactive.

Are you worried your IT security training isn’t hitting the right cord with your employees? Here are a few tips.

Read the rest of entry »

New Apple iPad Promises to be a Learning Experience

By George Rosenthal

Apple has launched its new 9.7 inch iPad.  Strongly focused on the educational market, the newly updated device is now available at Apple stores and is being shipped to schools.  Priced at $299 for students and $329 for consumers, Apple is attempting to supplant Google-powered Chromebooks used by many teachers.  According to research from FutureSource Consulting, sales in the K-12 mobile PC market for 2017 saw strong upticks in sales for Google and Windows devices, and declines for Apple’s iPad. 

Apple is hoping a new selling point, the addition of Apple Pencil support to this lower-end device, will spur interest and sales.  Previously the Pencil was available only the higher-end iPad Pro Tablets.  Apple has priced the Pencil at $89 for students. They envision kids to use the Pencil for art projects and similar school work.

The company has also boosted device storage for the educational models. 200 GB is available to help students work with and maintain bigger projects. Others will find the standard models start with 50 GB. 

Read the rest of entry »

Evaluating the Latest Public Cloud Security Statistics

Today, nearly every IT professional is using cloud service in their operations. Most users employ a hybrid model, mixing public and private clouds to store data within their organization.

A recent statistic released by McAfee questions public cloud security, stating that 25% of businesses who employ a public cloud service have had confidential data compromised.

The statistic was included in McAfee’s annual Cyber Security Report, released ahead of the RSA Security Conference in San Francisco.

While 97% of businesses employ some form of cloud storage, up from 93% in the same study last year, only 69% trust their data in the cloud.

Among confidential information stored in the cloud, customer information is the most common, reported in 61% of organizations. About 40% of companies store internal documentation, payment card information and personal staff data in the cloud, while 30% of users rely on the cloud for intellectual properties, healthcare records, competitive intelligence and network pass card storage.

Read the rest of entry »

Pages: Previous1234567...32NextReturn Top