GadellNet Blog

Security as a Service (SECaaS) Explained

January 31, 2019

What is Security as a Service? Every time you turn around, it seems like there is a new "BLANK as-a-Service" provided. These services are generally a business model that allows for web-based outsourcing. Security as a Service, or SECaaS, refers to web-based security solutions delivered over the cloud. SECaaS allows for a company to have an outside company to handle and manage their cybersecurity. For many small businesses, platforms that offer "as-a-service" are an ideal way to ensure the [...]

How Adaptive Security Architecture Can Protect Your Business

November 10, 2018

If there is one thing we know about cyber security, it’s that it's ever-changing. As the good guys come up with new ways to secure our systems, the bad guys figure out ways around that. It’s gone on this way for many years now and we expect to see that continue. Adaptive security architecture is a different take on cyber security, using an intuitive, multi-layered approach.  Cyber security, in the past, has not operated as a similar situation would in nature. If we look at the human [...]

Sox Compliance: What Is It and Why You Need It

October 10, 2018

What is SOX Compliance? SOX stands for the Sarbanes-Oxley Act drafted by congressmen Paul Sarbanes and Michael Oxley, and passed by congress in 2002. The idea behind this act was to protect shareholders and the general public from both accounting errors and fraudulent practices in companies through improving the accuracy of corporate disclosure - meaning, your data needs to be safeguarded. Bringing transparency in corporate governance and formalizing a system of checks and balances has prove [...]

Cyber Threat Hunting: Tricks and Tools You Need

September 5, 2018

A lot of cyber security processes are reactive. Indicators of Compromise, for instance, interpret clues that could indicate an attack in process or that data has already been compromised. This and other types of security monitoring are important for a holistic cyber security plan, but threat hunting is a different approach. What is Threat Hunting? In cyber threat hunting, IT professionals proactively look for weaknesses that could allow a cyber attack into a system or network so they can thwar [...]

Indicators of Compromise (IOCs): Definition and Examples

August 9, 2018

Cyber security is an important part of your business strategy; there’s no doubt about that. With so many terms surrounding the ins and outs of cyber security, it can be hard to keep track and stay well informed. Indicators of Compromise: What is an ICO? Indicators of Compromise is a hyper-specific cyber security term. Indicators are activities that lead IT professionals to believe a cyber security threat or breach could be on the way or in progress, aka compromised. More specifically, IOC [...]

Spear Phishing vs Phishing + How to Avoid Both

June 8, 2018

Spear Phishing vs. Phishing Spear phishing and phishing are both forms of malicious electronic communication that involve tricking people into giving out personal, sensitive information. The primary difference is that general phishing attempts are sent to masses of people, whereas spear phishing attempts are personalized to an individual. Consider the following scenario... You receive an email from your bank. They’ve emailed you before, so you’re not suspicious. You open the email and read [...]

General Data Protection Regulation: What you Need to Know

May 23, 2018

Who does GDPR apply to? The GDPR applies to all businesses that have: Personnel in business locations of any type (e.g., office, manufacturing plant or distribution center) in the European Union Employees, contractors, consumers, customers, patients or other people who are citizens of, located within or currently traveling through the European Union Processing that includes some type of monitoring of individuals within, or who are citizens of, the European Union Goods and/or servi [...]

Cyber Security: the Why and How for Small Business

May 1, 2018

If you’re like 71% of small business leaders, you may feel vulnerable to a cyber attack. According to a study done by Microsoft, the biggest concerns for small to mid-sized business leaders are phishing schemes, compromised passwords, ransomware, and sensitive information being leaked by an employee. With the way cyber criminals have been working, your concerns are well-placed. Both ransomware and phishing schemes have rapidly grown over the last three years. These attacks haven’t doubled or [...]

Yes, You Should Update Your Phone

April 9, 2018

It seems like every time we turn around, there’s another notification on our smartphone to run an update. It can be a hassle, it can be annoying, but it’s also necessary. Many people put off phone updates or avoid them completely, but we’re here to tell you that’s not a great idea. The number one reason you should stay on top of your phone updates is because of security. Software systems are incredibly complex and none are perfect – flaws exist. Hackers know this and they try hard d [...]

Threats Posed by Ex-Employees

February 26, 2018

No company has 100% employee retention rate. Some may get close, but in today’s business landscape, employees come and go regularly. It’s become part of the natural cycle for companies and people’s careers. Parting doesn’t mean you’re on bad terms with this person, of course. People part ways for many reasons, but even if you do part with an employee on good terms, it’s important to have your offboarding procedures finely tuned. The fact of the matter is, these ex-employees can pose [...]