The Unseen Threats to Wireless Connections

Virtual ArmourCybersecurity

Unsecured wireless networks can hemorrhage personal and business data and even create far-reaching legal issues Once upon a time, owning electronic equipment also meant owning a plethora of cables – it was an accepted drawback of the emerging information age. Even television sets were controlled through cables – anyone remember the Zenith ‘Lazy Bones’ system – and the concept of … Read More

Six Essential Steps Towards Building a Sound Cyber Defense Strategy: Part Two

Virtual ArmourCybersecurity

Continuing to break down how organizations can protect themselves against serious cyber threats Previously we looked at how a company can begin to approach a cyber defense strategy. These next three steps will address how employee permissions and overall network design can be used in the ongoing protection against cyber damage. The following strategies are focused on limiting a potential … Read More

Six Essential Steps Towards Building a Sound Cyber Defense Strategy: Part One

Virtual ArmourCybersecurity

A two part look at the most important steps organizations can take to guard against cyber threats With the current highly-publicized nature of data breaches, it’s easier than ever for executives and risk auditors to understand the serious financial and reputational damage caused as a direct result of cyber attacks. What isn’t so publicized is the security risk management, defense … Read More