www.soundshore.nethubfssoundshore-siteheader-img-2

The Next Level Network Blog

IT Management, Security, Compliance for Regulated Firms

Cyber Attacks on IoT Devices Are Rising

Jun 14, 2019 12:07:28 PM / by Eric Benda, CEO posted in cyber security, Soundshore Technology Group, IoT Cyber Attacks, SecureRF

0 Comments

Why More Secure Smart Devices Are Critical to Network Security

In recent years, there’s been a lot of attention on the Internet of Things (IoT). The IoT is revolutionizing many aspects of modern life, but it is also enabling unprecedented cyberattacks on IoT devices. It’s critical for businesses to understand how and why these attacks work, as well as why they must seek more secure smart devices to protect office network security. This is especially true of regulated industries including financial services and healthcare that are adopting IoT technologies to better serve their clients and patients. They must also deal with the downside.

According to its Wikipedia definition, IoT is the extension of Internet connectivity into physical devices and everyday objects. These devices can then communicate and interact with others over the Internet, and they can be remotely monitored and controlled. It’s easy to imagine how bad actors could exploit these factors to breach a smart home security system or to spy on an office conference room via a smart TV.

Read More

Does the EU’s GDPR Affect US Data Privacy and Cyber Security Compliance Strategy?

May 8, 2019 2:21:06 PM / by Eric Benda, CEO posted in Compliance, cyber security, data privacy

0 Comments

Yes, Especially Regulated Industries. And US Regulations Are Coming. Prepare.

Read More

Penetration Testing Tools: In Hackers’ Hands New Modlishka Tool is a Cyber Security Threat

Apr 25, 2019 9:00:00 AM / by Jennifer Valle, Director of Marketing and Operations posted in cyber security, penetration testing, phishing, multi-factor authentication, Modlishka

0 Comments

Can Overcome Multi-factor Authentication and Enable Phishing

As a basic element of cyber security programs, penetration testing is standard protocol for detecting possible IT network vulnerabilities. There are many penetration testing tools available that simulate hacker attacks to discover cracks in firewalls and other defenses. Developers are constantly building new tools to keep up with evolving threats and the measures put in place to avert them.

Read More

Standardized Multi-factor Authentication Just Became a Reality

Apr 17, 2019 12:15:35 PM / by Liege Payne, Director of Sales & Business Development posted in Security, cyber security, U2F, multi-factor authentication

0 Comments

Tech Group The FIDO Alliance Is Leading Us to a Password-free Internet, Greater Security

What Is It?

One of the greatest fears today is that hackers will steal the passwords we use to access social, banking and other sites where we must register to take advantage of their features and offerings and steal our data. The threat for businesses – especially regulated entities – is that employees will fall for password-centric schemes, like phishing, that can compromise a company’s entire IT network. Better days are here – and even better ones are ahead.

Read More

Cyber Security Services: Do You Need A Data Hostage Negotiator?

Apr 8, 2019 9:00:00 AM / by Eric Benda, CEO posted in cyber security, cybersecurity

0 Comments

Get Our Complimentary Guide to Freeing Your Files in a Ransom Ware Attack – And Avoiding One

According to a recent report from Datto, a leading provider of cyber security services and solutions to managed service providers (MSPs) like us, ransomware attacks are continuing to grow like wildfire and are expected to continue increasing at a rapid clip. These costly cyber security attacks tie up your data until you pay a ransom to the hacker. It’s not just the ransom money, but also the downtime and loss of productivity that make this a threat to avoid or manage efficiently.

Read More

Spear Phishing: A Growing Cyber Threat in 2019

Apr 5, 2019 9:00:00 AM / by Liege Payne, Director of Sales & Business Development posted in Security, cyber security, Ransomware, phishing

0 Comments

Learn About This Dangerous Type of Phishing and How to Prevent It

A survey of managed service providers and in-house IT professionals conducted by our cyber security partner KnowBe4 revealed that phishing/spear phishing is the number three cyber threat that “keeps them up at night.” Other studies show that spear phishing stands to be one of the fast-growing types of cyber-attack in 2019.

Read More

Contract Renewal Time: An Opportunity for Vendor Cyber Security Risk Assessment

Mar 21, 2019 10:54:01 AM / by Jennifer Valle, Director of Marketing and Operations posted in cyber security, assessment

0 Comments

How to Review Third Parties to Assure They Don’t Create Vulnerabilities for Your Regulated Firm

When OCIE comes knocking to learn whether your regulated firm has robust cyber security policies and plans in place, one critical area of inquiry will be third-party cyber security risk management. They want to know if you’re performing a cyber security risk assessment of the vendors who have access to your data or network – and taking action based on the results.

Read More

Building Cyber Security Training Programs for Employees

Mar 5, 2019 9:00:00 AM / by Eric Benda, CEO posted in Compliance, cyber security, training

0 Comments

Critical for IT Network Security and Regulatory Compliance

This post will outline how to build effective cyber security training programs for employees. Here’s why it’s important for you to read on and then take action if you haven’t already done so:

Read More

Cyber Security Plan Step 1: IT Inventory Management

Feb 7, 2019 12:21:34 PM / by Eric Benda, CEO posted in cyber security

0 Comments

Identify and Manage All Hardware and Software on Your Network

As we’ve been discussing, protecting your IT network from online threats requires a cyber security plan. Arguably, the first step in that plan is to identify and inventory all of the hardware and software on the network. This is critical to IT inventory management -- an ongoing, multi-step effort to make sure every element of the network has up-to-date protection against vulnerabilities. It is considered a best practice for regulated entities. This post will outline key issues of inventory management beginning with why it’s so important.

Read More

A New Guide to Microsoft Office 365 Security and Compliance: Don’t Be Your Own Worst Enemy

Jan 22, 2019 1:49:13 PM / by STG Blogger posted in cyber security

0 Comments

End Unintended Consequences of Improper Set-up, Lacks in Monitoring and Cyber Security Training

We’re pleased to introduce our new – and complimentary – Guide to Microsoft Office 365 Security and Compliance.

As a Microsoft Office 365 partner, it was important to us to create this guide. Many of our clients are in regulated industries and have legal compliance concerns. We confidently provide many of them with Office 365. Not only is it a powerful productivity tool, but also Microsoft seriously addresses security in its products.

Read More