Cyber Security

Your Network Copier/Printers Are a Major Security Risk

Written by Tim Jones on Monday, 11 February 2013. Posted in Cyber Security

Your Network Copier/Printers Are a Major Security Risk

Have you ever copied a patient’s ID, social security card or credit card? You, or someone in your practice probably has and if that printer is hooked up to your network, you could be posing a serious risk to your practice by making it very easy for a hacker to steal that data!

Most modern printers and copiers have internal hard drives. Most people don’t realize it, but every time you make a copy, or send a job to the printer, it is stored on that hard drive. This is so print jobs can be prioritized or queued for later, but it poses a serious cyber security risk.

Lessons in Cyber Security: FIPS 140-2 Security Regulations

Written by Phil DuMas on Tuesday, 13 November 2012. Posted in Cyber Security

Lessons in Cyber Security: FIPS 140-2 Security Regulations

All security is not created equal but it can be hard to separate types and levels of security especially in the context of security professionals trying to make a sale. There are standardized levels of security established by the U.S. government to ensure that at the very least, government information is secure. These standards also set up a guide system for the private sector where companies can receive government validation at different levels as a seal of quality. One standard that has become somewhat well known among IT professionals is FIPS 140-2.

It's Possible To Protect Yourself Against A Denial of Service Attack

Written by Keith Vassalotti on Wednesday, 07 November 2012. Posted in Cyber Security

It's Possible To Protect Yourself Against A Denial of Service Attack

While reading CFO magazine recently I came across this article highlighting the recent cyber-attack on HSBC. After reading it and sharing it with our team it became more apparent that businesses may not be taking cyber threats as serious as they should. The saddest part of this particular case is that you can protect yourself against a denial of service attack.

Cybrix Group Joins Forces with DNE for SPAWAR Contract

on Wednesday, 08 August 2012. Posted in Cyber Security

Cybrix Group announced today that through a new partnership with Dynamic Network Enterprises, Inc. (DNE), they have been chosen to support the Space and Naval Warfare Systems Center Atlantic (SPAWAR) with network and security services.

Read the full Press Release here

Cybrix launches security audit for one of the largest mortgage firms in the US

Written by Phil DuMas on Tuesday, 05 June 2012. Posted in Cyber Security

Large financial firm hires Cybrix to conduct large scale penetration testing of their network.

One of the nation's top mortgage companies has recently hired Cybrix Group's penetration testing services to ensure the vital security of their network. Big mortgage companies have a lot of money and personal information at stake, which means they are prime targets for hackers and cyber security is one of their largest concerns. They've trusted us to use our expertise to find the gaps in their armor before the hackers do so they can fortify their system and avoid costly security breaches.

Don’t Get Caught Unprepared: Learning Lessons From The Pain of Others and Planning In Advance Can Make a Difference

Written by Keith Vassalotti on Monday, 12 March 2012. Posted in Cyber Security

A recent article on CFO.com entitled, “Inside a Cyber Attack,” caught our attention and we’re sharing it with you because, as soon as we read it, we were reminded that the protector has to be perfect all the time while the attacker has to be lucky only once. This article is about a distributed denial of service (DDoS) attack on Yola, a global company offering do-it-yourself website building and hosting services. A DDoS is a systematic attack from thousands of computers all over the internet that send requests to a company’s servers at the same time, overwhelming and crashing them. In Yola’s case, the DDoS caused an eight-hour outage—so all of Yola’s customers who rely on Yola for their websites, eCommerce stores, social networking pages and more were also down. The impact of this crisis was immediate—lost revenue, lost credibility, huge inconvenience. It’s an IT (and a PR!) nightmare.

Disaster Recovery: Good Spend or Trend?

Written by Carson Bomar on Wednesday, 29 February 2012. Posted in Cyber Security

Disaster Recovery: Good spend or IT trend?

MSPmentor's annual report of managed services reported that the most popularly offered IT service in 2011 was Business Continuity/Disaster Recovery. While we at Cybrix Group also offer Business Continuity and Disaster Recovery Planning and Support, this report surprised us. We would have suspected the services that meet the more urgent issues, like Cyber Security or Managed Network Services, would have topped the list. We wondered, 'Are Disaster Recovery Services a trend?'

We've Been Nominated!

Written by Tim Jones on Monday, 27 February 2012. Posted in Cyber Security

We’re so excited to share the good news! We’ve been nominated for an award at the BizTech Innovation Summit Awards & Expo of 2012 in the category ‘Best Collaboration’ for our work with a multi-site Tampa Bay-based podiatry practice, Ankle + Foot of Tampa Bay! While we meet Ankle + Foot as a result of unfavorable circumstances (they were victims of data breach—they didn’t know how much data was compromised or even which records were affected!), our relationship has blossomed into a collaborative, on-going partnership. Now that we’re almost finished with remediation efforts, the focus of our efforts have transitioned from reactive initiatives to proactive activities—we want to make sure this thriving practice never experiences disaster again!

Taking Stock and Saving Money

Written by Keith Vassalotti on Friday, 20 January 2012. Posted in Cyber Security

When it comes to your business, Cash is King. Positive cash flow drives your business and cash on hand gives you the cushion you need to grow, invest, survive economic downturns, pay bills, manage emergencies and take advantage of opportunities. Of course, you make money by increasing your revenues, but you can also make money by decreasing your costs. When it comes to your IT department, for instance, did you know that there are number of cost saving tips you can implement quickly? It’s all about taking stock of your:

What Are Your Risk Factors?

Written by Keith Vassalotti on Monday, 16 January 2012. Posted in Cyber Security

When you go to the doctor for a checkup, your physician may talk with you about your health and your risk factors so that you can make informed decisions and put preventative measures in place before you get sick. What about your business? You can’t take it to the nearest clinic and put it through a typical checkup, but that doesn’t mean your business’ health isn’t subject to its own set of risk factors. The risks associated with certain regulations like PCI or HIPAA compliance are easy to spot, but what about the tougher-to-identify risk factors that could slow cash flow or create unplanned expenses?

Don't Be a Statistic—Business Failure Could Be Just One Breach Away

Written by Keith Vassalotti on Tuesday, 10 January 2012. Posted in Cyber Security

Did you know that statistics show that 43% of businesses who experience a PCI breach go out of business in the first year after the breach and 95% within five years? You might think your business is too small to attract the attention of a hacker but are you willing to risk your business to that assumption?

Starting Your 2012 Budget?

Written by Keith Vassalotti on Friday, 06 January 2012. Posted in Cyber Security

I’ve been a financial executive for many years and have served in organizations of various sizes in different industries. A rite of passage for all finance executives, especially CFOs, is the annual budget. So much planning goes into the annual budget that entire books have been written on the subject. If you’re in the swing of your annual budget in preparation for 2012, here are a few points to consider when it comes to weighing the importance of IT projects for your 2012 budget. IT costs may be the second largest component of your budget after payroll/benefits, so the decisions you make will impact your bottom line—and hamper or accelerate business growth!

See the Light on the Most Essential Aspect of your IT Budget

Written by Keith Vassalotti on Monday, 02 January 2012. Posted in Cyber Security

When it comes to budgeting for IT, there are a lot of factors to consider—some short term, and some longer term: maintenance and support costs, standard IT purchases, new IT projects or major system upgrades, vendor fees, testing and downtime… Yes, all of these elements are important if you’re a CFO or CIO and you’re deep into your budget planning. In my experience, though, there’s one area where many companies don’t have clear visibility: the cost of ‘keeping the lights on’ from an IT perspective. This is critical because your technology probably drives all of your business activities. If you disagree, think about the last time your computer crashed and you sat around for hours while it was being serviced.