www.soundshore.nethubfssoundshore-siteheader-img-2

The Next Level Network Blog

IT Management, Security, Compliance for Regulated Firms

Spear Phishing: A Growing Cyber Threat in 2019

Apr 5, 2019 9:00:00 AM / by Liege Payne, Director of Sales & Business Development posted in Security, cyber security, Ransomware, phishing

0 Comments

Learn About This Dangerous Type of Phishing and How to Prevent It

A survey of managed service providers and in-house IT professionals conducted by our cyber security partner KnowBe4 revealed that phishing/spear phishing is the number three cyber threat that “keeps them up at night.” Other studies show that spear phishing stands to be one of the fast-growing types of cyber-attack in 2019.

Read More

Contract Renewal Time: An Opportunity for Vendor Cyber Security Risk Assessment

Mar 21, 2019 10:54:01 AM / by Jennifer Valle, Director of Marketing and Operations posted in cyber security, assessment

0 Comments

How to Review Third Parties to Assure They Don’t Create Vulnerabilities for Your Regulated Firm

When OCIE comes knocking to learn whether your regulated firm has robust cyber security policies and plans in place, one critical area of inquiry will be third-party cyber security risk management. They want to know if you’re performing a cyber security risk assessment of the vendors who have access to your data or network – and taking action based on the results.

Read More

Building Cyber Security Training Programs for Employees

Mar 5, 2019 9:00:00 AM / by Eric Benda, CEO posted in Compliance, cyber security, training

0 Comments

Critical for IT Network Security and Regulatory Compliance

This post will outline how to build effective cyber security training programs for employees. Here’s why it’s important for you to read on and then take action if you haven’t already done so:

Read More

Cyber Security Plan Step 1: IT Inventory Management

Feb 7, 2019 12:21:34 PM / by Eric Benda, CEO posted in cyber security

0 Comments

Identify and Manage All Hardware and Software on Your Network

As we’ve been discussing, protecting your IT network from online threats requires a cyber security plan. Arguably, the first step in that plan is to identify and inventory all of the hardware and software on the network. This is critical to IT inventory management -- an ongoing, multi-step effort to make sure every element of the network has up-to-date protection against vulnerabilities. It is considered a best practice for regulated entities. This post will outline key issues of inventory management beginning with why it’s so important.

Read More

A New Guide to Microsoft Office 365 Security and Compliance: Don’t Be Your Own Worst Enemy

Jan 22, 2019 1:49:13 PM / by STG Blogger posted in cyber security

0 Comments

End Unintended Consequences of Improper Set-up, Lacks in Monitoring and Cyber Security Training

We’re pleased to introduce our new – and complimentary – Guide to Microsoft Office 365 Security and Compliance.

As a Microsoft Office 365 partner, it was important to us to create this guide. Many of our clients are in regulated industries and have legal compliance concerns. We confidently provide many of them with Office 365. Not only is it a powerful productivity tool, but also Microsoft seriously addresses security in its products.

Read More

Software Patch Management Best Practices: A Key Part of Your Cyber Security Program

Jan 4, 2019 2:18:01 PM / by Eric Benda, CEO posted in cyber security

0 Comments

Security Updates Must Go Beyond Your Operating System to 3rd Party Software, Apps

Many of our clients are regulated entities in financial services and healthcare. In our ongoing concern for their cyber security in the face of increasing and evolving threats from individual and nation state bad actors, patching security vulnerabilities in software and applications is an integral part of every cyber security program we implement. Because many companies believe that their Microsoft and Apple security updates have them covered, this post shares some additional software patch management best practices.

Read More

Encrypted Email Services: Know What You're Getting

Dec 19, 2018 8:55:00 AM / by Eric Benda, CEO posted in Email encryption

0 Comments

The ‘Encryption Myth’ May Open Regulated Businesses to Added Security and Compliance Risk

This post is motivated by the growing number of inquiries we’re receiving from clients about whether they should be using one of the cloud-based email encryption services available today from companies including Citrix, Sharefile, Smarsh, AppRiver and others. Many of our clients are in regulated industries -- financial services and healthcare.

Read More

Cyber Security Training: How to Phish-proof Your Employees

Nov 26, 2018 9:00:00 AM / by Liege Payne, Director of Sales & Business Development posted in Security, cyber security, phishing

0 Comments

Drastically Reduce Vulnerabilities in Only 90 Days

Continuing our discussion of cyber security training for employees of regulated organizations, this post examines the growing threats from phishing schemes and suggests training that will reduce the possibility that your staff will inadvertently unleash a disastrous attack on your systems, data and client assets.

Read More

Cyber Security Training for Employees: Protecting New Personal Devices

Nov 7, 2018 8:42:00 AM / by Eric Benda, CEO posted in cyber security, cybersecurity

0 Comments

Don't Let Their Holiday Technology Gifts Become 'Gifts' for Hackers

Our last post discussed the importance of cyber security training for employees. Along those lines, at holiday time we always make sure to alert our customers and their staffs to a particular concern: devices received as personal gifts that will also be used for business. If they’re not set up according to best practices by your network security team, they could represent a serious cyber security threat and compliance problem for your regulated business.

Read More

Is AI Snooping On Your Office Conversations? Cyber Security Training Can Keep Them Confidential

Oct 11, 2018 5:53:03 PM / by Eric Benda, CEO posted in cyber security

2 Comments

Take Action Before Letting Alexa, Siri and Bixby Into Your Private Meetings!

Are our artificial intelligence devices listening to us all the time and saving our conversations? The fact is, we just don’t know. Although most of the alarm has centered around home use of these devices, it’s time that we consider the potential negative implications on data security and privacy in the workplace – especially as regards regulated businesses. So what do we know?

Read More