GadellNet Blog

Cybersecurity Hygiene

September 13, 2021

Cyber Risks Accelerated by COVID-19  The trends in cybersecurity we saw before 2020 have, unsurprisingly, only been accelerated by COVID-19 and the great migration to remote work across the world. Combine that with unplanned and rushed cloud migrations as part of moving to remote work and an environment has been created that is ripe for cybercriminals. Without taking the time to plan and put the proper security measures in [...]

Password Security: First Line of Defense

August 31, 2021

In 2019, 23.2 million victims worldwide used “123456” as their password, according to Security Magazine*. Making a few small changes to your passwords can go a long way to help keep your data and identity secured. Recycled passwords, uncomplicated passwords, and real words could be opening you and your company up for a security breach.  Don’t Recycle Passwords According to a survey by Google**, 66% of Americans use the same password across multiple inli [...]

Cyber Threat Hunting: Tricks and Tools You Need

June 23, 2020

A lot of cybersecurity processes are reactive. Indicators of Compromise (IOCs), for instance, interpret clues that could lead an organization to uncover threatening activity that is already in progress or has already compromised a system. This and other types of security monitoring are important for a holistic cybersecurity plan, but threat hunting is a different approach. What is Cyber Threat Hunting? Cyber threat hunting is when IT professionals proactively look for weaknesses that could allo [...]

Indicators of Compromise (IOCs): Definition and Examples

March 9, 2020

Cybersecurity is an important part of your business strategy; there’s no doubt about that. With so many terms surrounding the ins and outs of cybersecurity, it can be hard to keep track and stay well informed. Indicators of Compromise: What is an IOC Used for? Indicators are activities that lead IT professionals to believe a cybersecurity threat or breach could be on the way or in progress or compromised. More specifically, IOCs are breadcrumbs that can lead an organization to uncover threate [...]

Eliminating​ Insider Risk to Your Data

October 18, 2019

Data breaches are continually rising in frequency and intensity. Small businesses have been increasing their investments in cyber security steadily over the last five years. From antivirus to threat detection software, you can invest any sum of money into your cyber security measures and be the better for it, but that's not where the biggest threats to your business are coming from. Cyber security platforms can't do all of the work for you. Although there has been a drop in insider threats [...]

Mobile Device Management: Letting Data walk out the Door

October 7, 2019

You wouldn’t let an ex-employee walk out the front door with boxes of documents, would you? Of course, you wouldn’t. You probably wouldn’t even let a current employee walk out the door with boxes of documents, especially those containing sensitive information. They could be lost, stolen, or otherwise, end up in the wrong hands. It could put your entire company at risk, plain and simple. So, why do you let them walk out the front door with their unprotected mobile device? Think about how [...]

Security as a Service (SECaaS) Explained

January 31, 2019

What is Security as a Service? Every time you turn around, it seems like there is a new "BLANK as-a-Service" provided. These services are generally a business model that allows for web-based outsourcing. Security as a Service, or SECaaS, refers to web-based security solutions delivered over the cloud. SECaaS allows for a company to have an outside company to handle and manage their cybersecurity. For many small businesses, platforms that offer "as-a-service" are an ideal way to ensure the [...]

How Adaptive Security Architecture Can Protect Your Business

November 10, 2018

If there is one thing we know about cyber security, it’s that it's ever-changing. As the good guys come up with new ways to secure our systems, the bad guys figure out ways around that. It’s gone on this way for many years now and we expect to see that continue. Adaptive security architecture is a different take on cyber security, using an intuitive, multi-layered approach.  Cyber security, in the past, has not operated as a similar situation would in nature. If we look at the human [...]

Sox Compliance: What Is It and Why You Need It

October 10, 2018

What is SOX Compliance? SOX stands for the Sarbanes-Oxley Act drafted by congressmen Paul Sarbanes and Michael Oxley, and passed by congress in 2002. The idea behind this act was to protect shareholders and the general public from both accounting errors and fraudulent practices in companies through improving the accuracy of corporate disclosure - meaning, your data needs to be safeguarded. Bringing transparency in corporate governance and formalizing a system of checks and balances has prove [...]

Spear Phishing vs Phishing + How to Avoid Both

June 8, 2018

Spear Phishing vs. Phishing Spear phishing and phishing are both forms of malicious electronic communication that involve tricking people into giving out personal, sensitive information. The primary difference is that general phishing attempts are sent to masses of people, whereas spear phishing attempts are personalized to an individual. Consider the following scenario... You receive an email from your bank. They’ve emailed you before, so you’re not suspicious. You open the email and read [...]