<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=152771375339675&amp;ev=PageView&amp;noscript=1">

Security on the Wire

eWeek: "HOPZERO and 'Mission Impossible' - Where Data Self-Destructs"

/ by Bill Alderson posted in network security, hop value, internet security firewall, server security

0 Comments

It’s not often you find out your company has something in common with the classic show, Mission: Impossible.

Read More

How to Avoid the 'Mousetrap Syndrome' of Network Security

/ by Jim Rounsville posted in network security, data limits, hop value, data breach

0 Comments

How do we protect our data?

Read More

Why Does Your Server Speak Russian? 

/ by Bill Alderson posted in network security, hop value, internet security firewall, firewall security

0 Comments

We all know how firewalls work; they prevent packets from passing through self-imposed barriers. But they don't limit how far packets go once they pass the threshold. 

The big question many U.S. organization database managers need to ask themselves is: is my server carrying high-value data to unfriendly countries? Firewalls are in place, but data is still leaking.

Is there anything else I can do to stop it?

Read More

"It’s Not You; It’s Me": Network Protection From the Inside-Out

/ by Ben Haley posted in data limits, data breach, hop value

0 Comments

Read More

Why "Less is More" When It Comes to Network Security

/ by Ben Haley posted in network security, hop value, internet security firewall, firewall security

0 Comments

Last week, Dark Reading published an analysis of 2017’s data breaches, and the results were quite bleak. 

Read More

How to Keep Your Server Safe (and Your To-Do List Manageable)

/ by Bill Alderson posted in hop value, data limits, data breach, server security, server security measures

0 Comments

Takeaways:

  • A “Crown Jewel” server is defined as one storing high-value data.
  • Nearly every large organization has one or more of these servers.
  • The word “catastrophic” is grossly insufficient to describe a possible compromise. 
  • Building the "biggest castle" around your server may not be the answer.

Executives worry about their “Crown Jewel Server,” and for good reason. They are often packed with industry secrets, financial data, private client information, and other highly private information…and usually they are unnecessarily unsecure

And they require a healthy amount of time, energy (and money) to safeguard—depriving you  of the chance to direct your resources elsewhere.

Read More

Does Your Golden Goose Server Stick Its Neck Out?

/ by Bill Alderson posted in hop value, server security, golden goose server

0 Comments

Takeaways:

  • Many Back-end “Golden Goose Servers” do Connect to the Internet
  • Firewalls are not the end-all protection they are made out to be
  • It’s dangerous (and expensive) to let your “Golden Goose Server” connect to the entire world

A “Golden Goose Server” is a device containing highly sensitive information – financial, health, security – also known as your most guarded secrets.

Protected by firewalls? Maybe…it’s not….

Read More
Privacy Policy