Back to all posts

Posts by Category: Security


Holiday Shopping Season Leads to Increased Cybercrime

November 20, 2018

Got a big sale planned for Black Friday? With the economy as strong as it is, retailers (and other businesses getting into the Black Friday act) should see some pretty good returns from their promotions this year. But IT Security professionals ...

Cloud Security Vigilance: A Shared Responsibility

June 15, 2018

Layering cloud security technologies can provide defense in depth but like any cloud security strategy, it requires vigilance – from you and your managed service provider. How much and what kind of security do you need? It can get complicated, ...

Key Elements in Your Cybersecurity Response Plan

June 7, 2018

As cyber-attacks become more sophisticated, and numerous, CIOs and CISOs need to up their ability to quickly respond to an attack. Data from Alert Logic’s Threat Hunting Report found that 56% of companies experienced an increase in ...

Cybersecurity Trends in 2018

May 24, 2018

Cybersecurity Trends: What to Expect in The Coming Year Cybercrime is on the rise, according to a new survey from TierPoint partner, Alert Logic. The report found that more than half of the respondents suffered twice as many attacks than the ...

4 Key Concepts To Fortify Your IT Security Strategy

February 9, 2018

The Network is everywhere…and so are the threats. To stay protected and competitive your IT security strategy must continue to evolve. For decades, the standard approach to IT security has been to protect the perimeter: put firewalls at the ...

Top 5 Cloud Data Security Threats in 2018

January 25, 2018

As a managed service provider (MSP), our security analysts work with customers that have a mix of on-site, public cloud, private cloud or colocation (colo) resources – all of which need to be protected in a consistent, visible and unified ...

Top 3 Healthcare Information Security Challenges

December 12, 2017

The healthcare industry is faced with the challenge of protecting patient data as it embraces more and more digital health technologies, ranging from wearables; diagnostic equipment; telemedicine tools; mobile care apps; and data-driven ...

5 Key Types of DDoS Attacks & How to Mitigate Them

December 5, 2017

Guest blog post by Carl Herberger, Vice President, Security Solutions at Radware Since the first Denial-of-Service (DoS) attack was launched in 1974, Distributed Denial-of-Service (DDoS) attacks have remained among the most persistent and ...

Subscribe to the TierPoint blog We'll send you a link to new blog posts whenever we publish, usually once a week.