How You Can Mitigate Security Risks

Cybercrime has become a serious issue for executives, who are increasingly responsible for their companies’ overall “security postures.”

At its most basic, your security posture is the state of your company’s IT infrastructure, and your preparedness to protect it against potential attackers. Your security posture encompasses your people, processes, technology – software and hardware – and especially, your data. Finally – and most importantly – your company’s security posture also includes your capacity to adapt to ever-evolving threats in today’s risky digital universe. Learn more

Wednesday, December 16, 2020/Author: Kelley Donald - MarCom/Number of views (3136)/Comments (0)/

Consolidated Communications is Proud to Partner with Palo Alto Networks, Recently Named a Leader in the 2019 Gartner Magic Quadrant for Network Firewalls.

Consolidated Communications partner, Palo Alto Networks has just been named a Leader in the Gartner Magic Quadrant® for Network Firewalls for the EIGHTH time in a row. This year, they are once again positioned the highest in ability to execute as well as furthest in completeness of visionLearn more.

Tuesday, September 24, 2019/Author: Anonym/Number of views (4754)/Comments (0)/

Preventing Cryptomining, Ransomware, and Other Related Threats and Breaches

Information security threats today come in many forms. If your organization is not prepared to recognize, fend off, and address threats like cryptomining and ransomware, your company’s financial resources and information, as well as your clients’ and employees’ information, are at risk. As if that’s not bad enough, your company’s reputation is also on the line. According to McAfee Labs December 2018 Threat Report, cryptomining malware grew by an astonishing 4,000 percent from 2017 to 2018, from 500,000 new coin miner malware to 4 million, while total malware grew by 203 percent in that time.

Understanding emerging threats and implementing solutions designed to address those threats can help you be prepared to ward off attackers and protect your organization’s bottom line. Learn more.

Thursday, July 18, 2019/Author: Anonym/Number of views (3374)/Comments (0)/

Distributed Denial-of-Service (DDoS) Attacks - An Economic Perspective

The first Distributed-Denial-of-Service (DDoS) attack is attributed to the efforts of a 15-year-old Canadian teenager who was able to intermittently attack Yahoo, Amazon, eBay, E*TRADE, and other companies throughout February 2000. The attacks resulted in the cumulative costs of approximately $1.2 Billion. Fast-forward to 2019 and DDoS attacks are not only occurring more frequently, but they are also more complex and destructive. The attack landscape has drastically expanded from a curious 15-year-old with access to public hacking tools, to cyber-terrorists and professional hackers interested in destabilizing businesses for financial or political gain. Learn more.

Tuesday, July 9, 2019/Author: Anonym/Number of views (5388)/Comments (0)/

Port-Based Firewalls: Is Your Organization's Data Truly Protected?

Your company’s network security is arguably the most important part of your information security efforts. If you are still relying on a port-based firewall, however, your company’s, clients’ and employees’ information may be more at risk than you realize.

With an increase in mobile device and cloud applications, and a growing number of devices online in one form or another (the “internet of things,”) organizations face more threats than ever before from both internal and external sources. In fact, according to Cisco, the number of devices connected to the internet today is a staggering 15 billion. By 2030, the number is expected to reach 500 billion (source: Marketsandmarkets.) Learn more.

Monday, June 24, 2019/Author: Anonym/Number of views (6059)/Comments (0)/

Theme picker