Skip to main content

Posts

Showing posts from February, 2017

Best Network Security Practices in 2017

          Collect Detailed Logs For a complete record of what goes on in your systems – both for security and troubleshooting purposes – you should collect detailed logs and report data. This is especially the case for applications that don’t have internal logging. By adding tools that can log the activities of these applications you will be able to plug any security holes those applications may create. Maintain Security Patches When cyber-criminals are constantly inventing new techniques and looking for new vulnerabilities, an optimized security network is only optimized for so long. When Home Depot’s POS systems were hacked last summer, they were in the process of installing a security patch that would have completely protected them. To keep your network protected, make sure your software and hardware security is up to date with any new antimalware signatures or patches. Beware of Social Engineering All of the technical IT security ...

ISO 27001 vs. ISO 27032 cybersecurity standard

Antonio Segovia There are many standards in the ISO 27001 series, all related to security.  You probably don’t know much about ISO 27032:2012 because it is not as well-known as ISO 27001, ISO 27002, or ISO 22301, but it is near you, because it has to do with a place that you habitually visit: cyberspace. The word “security” is a complex term that involves various disciplines, and it is composed of various domains, like application security, network security … and cybersecurity. So, cybersecurity is not synonymous with information security, application security, network security, etc. The main objective of cybersecurity is to require stakeholders to play an active role in the maintenance of cyberspace (i.e., it requires actions that stakeholders should be taking to establish and maintain security in cyberspace) and in the improvement of its reliability and utility. Cybersecurity and cyberspace First, a few basic things. What is cyberspace? It’s the virtual pl...

Network Security

Business security is becoming a much bigger challenge for today’s companies due to rapid advancements in technology and an ever-evolving marketplace. Team Logic IT provides your business with the end-to-end security solutions that safeguard your information at all levels – from user end points to the server and networking layers. Our multi-layered approach to network security is the offense and defense needed to protect your company on today’s playing field . Security Breaches Businesses large and small suffer similar concerns when it comes to vulnerabilities associated with viruses, spam attacks, firewall breaks and more. TeamLogic IT follows industry best practices, policies and procedures to assess threats to your operations and provide you with a customized security solution that protects the usability, integrity and reliability of your network. 24/7 Remote Monitoring You and your staff can’t oversee your computers and servers 24/7, but TeamLogic IT can. Our Re...