TierPoint Summit Keynote Provides Good Lessons for Developing Security Strategy

By Mike Sander, TierPoint Senior Solutions Engineer

Last week I had the privilege of attending TierPoint’s annual Security Summit in Omaha.

Former White House CIO Theresa Payton presented a well-received keynote address about security lessons she learned serving the president.  Attendees said they enjoyed the talk because it provided a business context around an organization’s security needs, as well as ideas to address the added pressure they feel with high-profile cyberattacks continually on the rise.

ttm-1024

(LtoR) Tom McMillin, TierPoint President and COO, Former White House CIO Theresa Payton and Mary Meduski, TierPoint President and CFO, kick off the 2016 TierPoint Security Summit

Continue reading

Multi-Layered Attacks Require More Sophisticated IT Security

By Paul Mazzucco, TierPoint Chief Security Officer

Cyber-criminals are after your corporate data and they’re going to great lengths to get it. With the help of sophisticated bot-nets, the Internet of Things and multi-layered attack strategies, the threat to sensitive customer data and intellectual property has grown stronger. Developing an effective security strategy starts with an understanding how these attacks work and the motives behind them.

In the past, cyber-attacks were often the work of casual hackers or petty criminals looking for an easy opportunity. Today’s hackers are a much more sophisticated bunch with more serious, and potentially devastating, goals.

pm-preso-post

Continue reading

Too Few Security Pros, Too Many DDoS Attacks: What’s a Company to Do?

By John Stoker, CISSP, Sales Engineering Manager at TierPoint

Once upon a time, IT security was all about perimeter defense: just keep the bad actors out, and you’ll be fine.

But if that’s your approach to security today, you’re living in a fairy tale.

SNMP-DDoS-Attack-ToolThere’s no better example of this than the modern Denial-of-Service (DoS) attack. A DoS attack is that of a single source attacking a specific destination in an effort to disrupt resources of the target host. A Distributed Denial-of-Service (DDoS) attack, which is more damaging, refers to attacks from multiple sources against a specific destination.

These kinds of attacks are proliferating in frequency and sophistication. Continue reading

It’s a Myth that Data is Inherently More Safe Outside of the Cloud

By Christian Lappin, Senior Sales Engineer, TierPoint

Earlier this week, TierPoint in Marlborough, MA hosted a cloud and security event with CAI Managed IT, one of our business partners. I gave a talk about cloud security myths and Frank Motta of CAI provided tips for managing security inside your organization.

I echo Larry Port, of Law Technology Today, who wrote this month that arguably “we’re at the point where cloud providers have the upper hand when it comes to providing secure storage for your critical information.” Continue reading