Managed Security Whitepaper (Part 3 of 3)

Brian Wood Blog

AIS commissioned Matthew McCormack to write a whitepaper and deliver a webinar on what YOU can do to protect your business from a cybersecurity standpoint. The whitepaper is called, “Will Managed Services Solve My Security Problems?” Mr. McCormack is a world-renowned security expert having served in multiple technical and executive roles in the cybersecurity field within the United States government. …

Managed Security Whitepaper (Part 2 of 3)

Brian Wood Blog

AIS commissioned Matthew McCormack to write a whitepaper and deliver a webinar on what YOU can do to protect your business from a cybersecurity standpoint. The whitepaper is called, “Will Managed Services Solve My Security Problems?” Mr. McCormack is a world-renowned security expert having served in multiple technical and executive roles in the cybersecurity field within the United States government. …

Managed Security Whitepaper (Part 1 of 3)

Brian Wood Blog

IT Security is a hot topic: Snowden. Manning. WikiLeaks. NSA. Target. It’s inescapable: Internet. TV. Radio. Cocktail parties. There’s no avoiding reality. What to do? AIS commissioned Matthew McCormack — one of the most noteworthy, experienced IT managed security experts on the planet — to write a whitepaper and deliver a webinar on what YOU can do to protect your …

Is Data Privacy More Valuable Than Ever?

Brian Wood Blog

The article below by Mark Stockley in Naked Security is the yang to yesterday’s yin on the same topic — so be sure to read both. The essence of the debate is whether we are gearing up to fight the last war rather than recognizing that the threats (and what we value) have changed over time. Emphasis in red added …

Attacks on the Domain Name System (DNS) on the Rise

Brian Wood Blog

According to data from Prolexic, a large and trusted distributed denial of service (DDoS) protection and mitigation service provider, attacks against the domain name system (DNS) are increasing. In 2013 alone, there was a 200 percent rise in attacks from the previous year and another 58 percent rise in DDoS attacks. What exactly are these “attacks” and what’s causing them? …

Securing the Cloud: We Get It

Brian Wood Blog

We understand: customers are particularly concerned about security when it comes to cloud services. No problem. That’s why we’ve invested considerable sums in annual 3rd-party audits by Moss Adams to verify that we do what we say we do. Recurring SOC 1, 2, and 3 Type 2 audits. A rigorous 21 CFR Part 11 audit. Trust AND verify. See the …

Moss Adams Article on Heartbleed

Brian Wood Blog

The article below was published by Moss Adams. Protecting Yourself and Your Organization from Heartbleed by Francis Tam, Partner, and Kevin Villanueva, Senior Manager, IT Auditing & Consulting Practice The Heartbleed bug is a vulnerability found in the OpenSSL cryptographic software library that could allow the theft of normally encrypted information, such as user names and passwords. OpenSSL is an …

AIS Heartbleed Attestation

Brian Wood Blog

Dear customers, partners, vendors, and prospects: In response to the recently announced Heartbleed SSL bug, AIS (American Internet Services) has thoroughly reviewed all of its publicly-accessible applications, devices, and services including the AIS client portal, known affectionately as T.A.S. (The Automated System). None of these systems were ever vulnerable to the Heartbleed exploit and there is no indication of exposure to …

Website SSL Certificates: Baby in Bathwater

Brian Wood Blog

Let’s not throw out the baby with the bathwater, m’kay? Article by David Hamilton in The WHIR. Emphasis in red added by me. Brian Wood, VP Marketing —— To Build Trust Online, SSL Certificates Are Still the Starting Point Trusted online communication is a truly vital aspect of the internet. From a technical perspective, we tend to rely on cryptographic …

Insider Threats: The Enemy Within

Brian Wood Blog

Maliciousness is inexcusable and should be prosecuted. Ignorance is leadership’s responsibility and should be rectified. Either may, constant and sophisticated monitoring is necessary in order to know what is going on. Article by Chris Burt in The WHIR. Emphasis in red added by me. Brian Wood, VP Marketing —– Insider Data Theft Among Top Cybersecurity Threats for US Federal Agencies: …