Category Archives: Security

Shadow IT – What You Need To Know

When I first heard the term “Shadow IT”, I had just finished watching Batman Begins, so the first thing that came to mind was a group of super villainous techies working for the League of Shadows, trying to collapse society one network at a time. The true definition of Shadow IT isn’t  anywhere near as […]

Read More

EDCi Announces Managed Security Services Partnership With RedLegg

Posted on Dec 6, 2017 by

  Appleton, WI – December 6, 2017–  EDCi, a full-service technology and communication solutions provider has announced a partnership with RedLegg, a global provider for managed and cybersecurity services. RedLegg provides a Channel Partner Program with comprehensive advisory solutions for real-world data protection and security challenges. Three core service offerings are Advisory which includes, Virtual […]

Read More

Why Firewalls Need Constant Refreshing… And Having Your Engineers and Your Business Take Ownership!

I had a discussion recently with a customer regarding firewall “ownership”.  Not which group owns the firewall (typically network, firewall or security) but actually taking ownership of the access rules within the firewall.  Sounds pretty boring, huh? Perhaps, but it is one of the most critical components your company can have in a layered security […]

Read More

How Adam Sandler Can Enlighten Us on Risk Management

Posted on Jul 12, 2017 by

Feeling a touch nostalgic last night, I listened to Adam Sandler’s 1993 comedic album, “They’re All Going to Laugh at You”.  The title purportedly comes from a repeated phrase in the 1976 horror movie Carrie. On the album, Sandler’s character keeps screaming, “Nooooo!! They’re all going to laugh at you!!” much to the anger and […]

Read More

Why A SIEM Platform is Critical to Every Organization

One of the most intensive and time consuming processes that any security engineer tackles is trying to put together the pieces of an attack lifecycle. From the endpoint analysis to the detection capabilities on the network devices, tracing an incident throughout your organization requires advanced technical skills and a solid methodology from the security analyst.  […]

Read More

Moving Beyond the FUD Factor

Posted on Apr 24, 2017 by

“If the world would be perfect, it wouldn’t be” ~ Yogi Berra Likewise, so are the actions of some information security practitioners. Have you ever spoken to an information security practitioner who loves to ring the alarm?  They tell everyone about the latest breaches and whose data was stolen, grumble about technology or processes that have […]

Read More

5 Phases of Ransomware Attacks

Posted on Mar 20, 2017 by

Ransomware is one of the most sinister threats out there for organizations because it is the most profitable type of malware attack. Once a cybercriminal hacks into a company’s files and encrypts them, organizations have little option but to pay the asking price for the code to decrypt and regain their original files. Understanding each […]

Read More

The Health and Success of Your Organization Depends on Security

Posted on Mar 16, 2017 by

In today’s high-risk world, it’s more challenging than ever to defend your organization against ever-increasing attack surfaces, security vulnerabilities and social engineering attacks. In order to defend your network and data efficiently, you need to implement strong processes and integrated security technologies. The experienced data security specialists at EDCi have recently done some great things […]

Read More