1. Homomorphic encryption: Closing the data-in-use security gap

    Over last two decades, companies have protected data in transit with VPNs, HTTPS, and TLS. Those same companies have also protected data at rest with various file-level and whole-disk encryption technologies. For data in transit, your browser or VPN software contacts a web or VPN server, they negoti…Read More

  2. How do cyber criminals get away with it?

    In a word, anonymity. A slew of privacy technique are allowing cyber criminals to buy and sell stolen private information relatively unscathed in most cases. HTTPS encryption has been around for about a couple decades now . The problem for criminals, though, is when they try to access a web-based re…Read More

  3. DDoS Facepalm

    Every company runs into a disgruntled ex-employee at some time or another. If you’re doing security well, you have a well-documented set of policies and procedures for locking accounts and freezing access after an employee is terminated. That’s if you’re doing security well, and most companies…Read More

  4. Why do companies keep getting hacked?

    It seems like every single day we hear about another data breach. These events don’t seem to be isolated to small business, large business, healthcare, retail, or any other category. Everybody is a target these days. The reason for this is because data = money. Yes… Data = money. Some data is wo…Read More

  5. Jeff Miller of Cyberstone- Ingram Micro Award Winner

    Jeff Miller of Cyberstone and Tim Gekas of Synergy IT Solutions were recognized at Ingram Micro's Awards Dinner last night in Colorado Springs. They received the Chapter Officers of the Year award for excellence in leading the Nor'easter Trust-X chapter of Ingram Micro together. Jeff and Tim work ti…Read More

  6. Shimming is the new skimming

    “Shimming is the new skimming”, according to a Better Business Bureau (BBB) post last week. What’s this all about? Credit card skimmers were and still are molded plastic overlays that criminals place around point-of-sale (POS) terminals. They steal magnetic card information from unsuspecting c…Read More