Security

Is your "IT Guy" able to MEET Industry Standard Expectations?

Organizations should follow the 1:10:60 rule: One minute to detect threats, ten minutes to investigate, and 60 minutes to contain and remediate an incident, endpoint security provider CrowdStrike said in a recent report. Here at Tomorrow's Technology Today we are ...

Can you survive ransomware?

It's a Saturday afternoon and my cell phone rings from one of my "providers" (I am going to protect the innocent). They proceed to let me know they were hacked everything was locked up and they have lost all our ...

Develop 'Security Champions' For Successful Enterprise Security Scalability

What steps have you taken to create an internal team of security champions to support your security strategy? The idea is to create "front-line support". @iiamit writes, "These advocates know their businesses better than any of my security engineers could, ...

Prepare for Windows Server 2008 end of support

With the Windows Server 2008 end of support coming up in just under one year, it's time to start thinking about your transition to a supported platform like Windows Server on Azure. At Tomorrow's Technology Today, we can help you ...

A scheme so sophisticated... customer service called at the right time?

At the quarterly Toledo Infragard meeting, the Special Agent from the Cleveland Division of the FBI discussed a current case.  The victim lost a substantial amount of money from a scheme so sophisticated... a well groomed "customer service" agent called ...

Apollo Data Breach - What does this mean to me?

Well another data breach announced today!  Statements from Apollo are saying it is not sensitive personally identifiable information but in my opinion it is worse because if it ...

50m Facebook User Accounts Breached

Discovered on September 25, 2018 - Facebook Engineers found 3 programming bugs (and they were breached) in their code that would allow hackers to take full control over ...

What is the location of my data at Microsoft?

Have you ever wondered... where is that Microsoft Cloud?  Where does my data live? Microsoft Office 365 helps you comply with your data residency requirements and regulations. On this page, we share ...

Latest Data Breaches

  Two data breach events exposed 150 million usernames, emails and passwords at UnderArmour, and 5 million credit/debit cards from Saks and Lord & Taylor retail stores. Panera Bread's recent data breach impacted up to 37 million customers — exposing ...

KRACK exploit - is your wireless safe?

This doesn’t just mean WAPs and routers need updated. ALL wireless devices should be updated. That means routers, WAPs, laptops, smartphones, EVERYTHING! Although you can’t get the password unencrypted when capturing random wireless signals, that doesn’t mean you can load ...