Blog
Shadow IT – What You Need To Know

Shadow IT – What You Need To Know

When I first heard the term “Shadow IT”, I had just finished watching Batman Begins, so the first thing that came to mind was a group of super villainous techies working for the League of Shadows, trying to collapse society one network at a time. The true definition of Shadow IT isn’t  anywhere near as […]

How to Protect Your Data From Ransomware Using a Virtualized Approach

How to Protect Your Data From Ransomware Using a Virtualized Approach

The saying goes, It’s not a matter of ‘if’ but ‘when.’ That saying holds true when it comes to the IT world and security. After all, the health and success of your organization depends on security! High-profile breaches, malicious insiders, phishing emails… the list goes on. No organization is 100% immune to the variety and […]

Why A SIEM Platform is Critical to Every Organization

Why A SIEM Platform is Critical to Every Organization

One of the most intensive and time consuming processes that any security engineer tackles is trying to put together the pieces of an attack lifecycle. From the endpoint analysis to the detection capabilities on the network devices, tracing an incident throughout your organization requires advanced technical skills and a solid methodology from the security analyst.  […]

Moving Beyond the FUD Factor

Moving Beyond the FUD Factor

“If the world would be perfect, it wouldn’t be” ~ Yogi Berra Likewise, so are the actions of some information security practitioners. Have you ever spoken to an information security practitioner who loves to ring the alarm?  They tell everyone about the latest breaches and whose data was stolen, grumble about technology or processes that have […]

5 Phases of Ransomware Attacks

5 Phases of Ransomware Attacks

Ransomware is one of the most sinister threats out there for organizations because it is the most profitable type of malware attack. Once a cybercriminal hacks into a company’s files and encrypts them, organizations have little option but to pay the asking price for the code to decrypt and regain their original files. Understanding each […]

The Health and Success of Your Organization Depends on Security

The Health and Success of Your Organization Depends on Security

In today’s high-risk world, it’s more challenging than ever to defend your organization against ever-increasing attack surfaces, security vulnerabilities and social engineering attacks. In order to defend your network and data efficiently, you need to implement strong processes and integrated security technologies. The experienced data security specialists at EDCi have recently done some great things […]