Cybersecurity Spring Cleaning: It’s Time to Review Your Security Practices

Virtual ArmourCybersecurity, Risk Mitigation & Prevention

Cybersecurity Spring Cleaning

When most people think of spring cleaning, they think of giving their house a thorough cleaning and donating unwanted items to charity. But spring is also a great time to review your organization’s cybersecurity protocols. To help you review your current protocols, and catch any gaps, here is a handy cybersecurity spring cleaning checklist. Infographic Skip to content Review Your … Read More

Beyond SIEM: Why Your Security Posture Needs to SOAR

Virtual ArmourCybersecurity, Risk Mitigation & Prevention

Beyond SIEM: Why Your Security Posture Needs to SOAR

Companies that are concerned about cybersecurity likely have SIEM protocols in place to safeguard their digital assets. However, cybersecurity and cybercrime are continually evolving and shifting, which means that simple SIEM approach is no longer enough. There is also a global shortage of qualified cybersecurity experts, which makes smart, integrated, comprehensive security response systems more critical than ever. That is … Read More

Building a Cybersecurity Incident Response Program

Virtual ArmourCybersecurity, Risk Mitigation & Prevention

A good cybersecurity plan is not optional, because in the modern world it is not a question of if you will be targeted by cybercriminals, but when. A robust cybersecurity incident response program is an integral component of any organization’s cybersecurity strategy. Without a solid response plan in place, it can be challenging to respond to breaches or threats effectively … Read More

Keeping Your Network Secure in a “Bring Your Own Device” World

Virtual ArmourBusiness, Cybersecurity, Endpoint

BYOD Network Security

On the surface, a Bring Your Own Device (BYOD) policy seems like a great business move. By allowing employees to use their own devices, such as laptops, smartphones, and tablets, companies can save money and increase productivity. However, securing your network in a BYOD environment poses unique challenges from both a cybersecurity and a privacy standpoint. If you don’t address … Read More

19 Essential Cybersecurity Best Practices

Virtual ArmourCybersecurity, Risk Mitigation & Prevention

19 Cybersecurity Best Practices

Every company, no matter how large or small, should have a robust cybersecurity strategy in place to protect their company’s digital assets. Staying secure in the digital era is no longer and set and forget practice. You must be diligent in your security practices and always on top of new trends. To help you ensure your data is secure here … Read More

DNS Spoofing: What It Is & How to Protect Yourself

Virtual ArmourCybersecurity, Risk Mitigation & Prevention

DNS Spoofing: What It Is & How to Protect Yourself

Cybersecurity crimes have plagued businesses large and small for years, but criminals are increasingly using DNS Spoofing as their tool of choice. In order to protect you and your business from cyber attacks like DNS Spoofing it is important for you to understand what DNS Spoofing is and what measures you can take to protect yourself and your business from … Read More

The Major Cybersecurity Threats of 2018… So Far

Virtual ArmourCybersecurity, Internet of Things

The Major Cybersecurity Threats of 2018 So Far

It seems like every year a plethora of cybersecurity threats are unleashed on the public. Cybercriminals are constantly evolving their tactics in order to steal and compromise important information. Over the past 12 months, we have seen the frequency – and severity – of cyber attacks reach a level of normalcy that large data breaches, such as the recent Equifax … Read More

Recapping DerbyCon 8.0

Virtual ArmourCybersecurity, Industry News & Events

Written by Tianyi Lu, Chief Architect Compared to larger security conferences, such as Def Con or Black Hat, DerbyCon is more intimate. For me, this means that I’ll have more opportunities to engage speakers and have meaningful conversations. This intimacy is by choice: the conference is quite exclusive, with tickets selling out within minutes of being released. If you’ve never … Read More