There have been some very dramatic headlines over the past few months about malware infections that have been breaking out around the globe. Factories shut down, websites infected and a loss of confidence by consumers. WannaCry, Petya, NotPetya…The list goes on. Are they ransomware or were they created to destroy? Are the perpetrators cybercriminals or […]
Encryption Key Management
Encryption keys and encryption key management are an important consideration when you are looking at implementing an encryption strategy. I will provide an overview of public key infrastructure (PKI) and pretty good privacy (PGP) key management. 1.1 PKI Key Management PKI is a centrally managed encryption strategy. The advantage to a PKI is that it […]
Securing the Cloud
The use of public clouds is continuing to increase and information security professionals must understand the native security provided by the public cloud vendor and the gaps that must be filled by the end-user. Just as in the case of a physical data centre there is an expectation that public cloud providers maintain a certain […]
Protecting Your Legacy Computers
Time moves quickly in IT. During consulting engagements, we plan for a system to be upgraded or replaced every three years. However, due to circumstances beyond our control some systems are required to perform many years past their ‘best before date’. Operating systems are no exception. Two pertinent examples are Windows XP and Windows Server. […]
Encryption: Knowing What to Protect
Encryption can be challenging, especially when you pick up training manuals that can be used for weight training (gym for the day: check). Microsoft’s PKI training manual or the many pages of documentation you need to read about understanding GPG/PGP can be daunting. So it’s easy to feel overwhelmed by not knowing how much effort […]
DCS: What Is It And Why Do You Need It?
Thunder crashes ahead as you drive down your street in the pouring rain. You pull your brand new Bugatti into your driveway, wind your windows down, get out and leave your driver’s door wide open with the key still in the ignition. You’d expect it to still be there in the morning and in perfect […]
Want to Know More About Symantec VIP?
You know that feeling when you walk into a room and feel like something is watching you? You turn around and BAM there’s an enormous huntsman sitting on your wall. After you’re done freaking out, you wonder how long it’s been sitting there without your notice. Hackers are like that Huntsman spider. It’s a lot […]
Symantec Advanced Threat Protection
For more information download the ATP brochure: advanced-threat-protection-network-ds-en Get in contact with Insentra today for all your security needs.
How Safe are your Systems Really?
How safe are your systems really? Worried about the integrity of your systems? You should be. Without proper protection, your systems will be vulnerable to attacks from all over the globe, putting both your company and client information at risk; but you know that already. As technology evolves, it’s becoming more difficult to trace breaches. […]
Password – You are the Weakest Link. Goodbye!
Did you know the average user has 26 password protected accounts and only five different passwords? With data breaches on the rise, the password is quickly becoming the weakest link. Compromised credentials are a concern among 90% of companies and with data breaches costing on average 3.5 million, security is more relevant than ever. Imagine […]