The more the threat landscape diversifies and changes, the more it stays the same. Some of the oldest tactics in cybercriminals’ playbooks remain the most prevalent and successful. In 2018, as in years past, the vast majority of data breaches were accomplished by criminal actors external to the targeted organization. But the majority of these […]
When cloud-based services first became popular more than a decade ago, business leaders embraced their versatility, scalability and predictable costs, but many did so with a sense of unease: was their valuable data truly safe when housed in an offsite data center to which they had no physical access? Would third-party cloud service providers offer […]
As we talked about in last week’s post, the PCI Data Security Standard has established a near-universal set of technical and operational requirements to which all businesses that process credit card transactions must adhere. Accepting card-based payments is the norm in the hospitality sector—it’s a must for any hotel or restaurant hoping to offer the […]
PCI DSS Basics: What Leaders Need to Know When You Required to Comply to PCI DSS The global hospitality industry has long been an attractive target for cybercriminals trying to pilfer credit card data. Hotels and restaurants were among the first businesses to adopt card-based payments: the world’s first charge card—Diners Club—was conceived of when […]
Keeping Your Hospitality Business Safe from PoSeidon Malware POS compromise remains alarmingly prevalent among hotel businesses, restaurants and retailers today. Although security breaches involving point-of-sale terminals received a great deal of mainstream media attention back in 2013 and 2014, attackers continue to target hotels and restaurants with malware-based attacks on POS systems in 2018, still […]
2017 was a peak year for data breaches. In terms of both size (number of records compromised) and frequency of attacks, 2017 stands among the worst years in history, with 2,600,968,280 records breached in more than 1,765 individual incidents, according to the annual Breach Level Index (BLI) report. Though large-scale incidents like the Equifax breach—in […]
What is a Kill Chain? The term “kill chain” was originally used in the military. In October 1996, after the first Gulf War, General John Jumper formalized the methods necessary to compress the time it takes to find and kill the enemy on the battleground. He termed it “compressing the kill chain.” General Jumper wanted […]
As we discussed in last week’s blog post, businesses are paying more than ever before for cybersecurity solutions, and market forecasters predict that this spending will only increase in years to come. Every time a large-scale attack gets media attention, publicly-held companies rush to reassure investors that their IT security spending is enough to reduce […]
Cybersecurity spending today is at all-time high, and is poised for further growth. But cybercriminal activity—attacks, breaches and resulting damages—has also peaked. CEOs, CIOs, and budget-conscious investors are all asking: are the available IT security solutions worth their cost? Would it make more sense just to pay off the hackers? Do proactive approaches even work? […]
Pharmaceutical Companies Face Unique Cybersecurity Challenges While Navigating Digital Transformation
Pharmaceutical executives are used to thinking of their products as drugs or medicines—molecular compounds used to treat or cure diseases, to aid in diagnosing them, to prevent their occurrence, or to lessen their severity. Today’s consumers (and insurers) are increasingly demanding results instead of medications, however. This shift to outcome-based medicine has been enabled by […]
OUR TECHNICAL APPROACH
We correlate these threat behaviors against a multitude of data sources, including vulnerabilities, external IP reputation, and other risk indicators to quickly detect, contain and respond before the breach.
WHAT OUR CLIENTS SAY"We contracted with Netswitch to provide managed services for our global IT operations beginning in 2006 and continuing through today on a long term contract. Netswitch provides OMNi with security protection, technical support for application maintenance and IT infrastructure support for hardware, software and operations management. Their Integrated Security platform is fantastic - these guys really understand data security. They put the whole structure in place to make it integrative with our overseas operations, and it has been seamless. They have been instrumental in our ability to grow and expand our business without having to worry about IT or data security and I recommend them highly.” — Sean Mahoney,
VP Operations , Omni Apparel International, Inc.