Blog
Infogressive has record first half of FY2014

Thank You!

Thanks to our customers in 40 states and 5 countries, Infogressive had a record first half of 2014. Our total revenue grew 92.9% over 2013′s Q1 and Q2.

“We’re honored that our customers continue to trust us to help them secure their organizations. Infogressive has done significant hiring in the past 3 months to accommodate our continued rapid growth. We’re very excited about the talent and people we’ve added recently. The future is bright for our organization as we continue to focus on securing our clients from all over the world, said Justin Kallhoff, Infogressive’s Founder & CEO.

Blog
Infogressive launches FortiSecurity.com

Infogressive proudly launched it’s first of a series of e-commerce sites, fortisecurity.com this week. The site is dedicated to selling Fortinet’s entire product line.

“Fortinet has been a key technology partner of ours since our inception, we have done a lot of great things together, it was only fitting that we embark upon this new line of business with them. We believe we can provide customers with the complete package they really need to secure their businesses against today’s threats by combining our partners’ great technologies with our certified engineers’ implementation assistance and our strategic managed security services. We look forward to helping customers from around the world with their security challenges, said Justin Kallhoff, Infogressive CEO.”

Please visit http://www.fortisecurity.com today and let us know what you think!

Blog
2014 Verizon Data Breach Report

Verizon Business released their annual Data Breach Report. They seem to be rapidly increasing their contributing list of vendors and organizations (50) in this always useful body of work. This year’s report is based on 1,367 confirmed data breaches, 63,437 security incidents and 95 countries represented. This is a sharp increase in 6 short years from their original report in 2008. We recommend this report for our clients to get a pulse on the ever-changing threat landscape and to learn from others breaches and mistakes.

http://www.verizonenterprise.com/DBIR/2014/reports/rp_Verizon-DBIR-2014_en_xg.pdf

Blog
Cisco 2014 Annual Security Report

Cisco recently released their 2014 Annual Security Report. Below are a few highlights that we found interesting. For the full report please click HERE.

  • All organizations should assume they’ve been hacked, or at least agree that it’s not a question of if they will be targeted for an attack, but when.
  • Java comprises 91 percent of web exploits; 76 percent of companies using Cisco Web Security services are running Java 6, an end-of-life, unsupported version.
  • Ninety-nine percent of all mobile malware in 2013 targeted Android devices. Android users also have the highest encounter rate (71 percent) with all forms of web-delivered malware.
  • 100 percent of business networks analyzed by Cisco have traffic going to websites that host malware.
  • In the aftermath of the Boston Marathon bombing on April 15, 2013, two large-scale spam campaigns commenced—one on April 16 and another on April 17—designed to attract email users hungry for news of the event’s impact. At its peak, spam related to the Boston Marathon bombing made up 40 percent of all spam messages delivered worldwide on April 17, 2013.
Blog
Stolen Laptops Result in $2M HIPAA fines

Serving notice that “covered entities and business associates must understand that mobile device security is their obligation,” the HHS Office for Civil Rights has settled with two organizations for a combined $1,975,220 penalty after their unencrypted computers were stolen.

That’s a big number. And that’s because it’s meant to drive home the point that unencrypted laptops and mobile devices pose significant risks to the security of patient information, said Susan McAndrew, OCR’s deputy director of health information privacy. “Our message to these organizations is simple: Encryption is your best defense against these incidents,” she said.

Source: Healthcare IT News

Blog
3 Million Customer Credit, Debit Cards Stolen in Michaels, Aaron Brothers Breaches

Brian Krebs is at again, breaking news regarding another large data breach. This time is Irving, Texas-based Michaels Stores Inc. losing 3 Million credit card numbers.

http://krebsonsecurity.com/2014/04/3-million-customer-credit-debit-cards-stolen-in-michaels-aaron-brothers-breaches/

http://www.michaels.com/corporate/payment-card-notice-faqs,default,pg.html

Blog
Infogressive CEO, Justin Kallhoff Quoted in CRN articles

Infogressive CEO, Justin Kallhoff was quoted in two different articles released this week by CRN:
 
FireEye, NSS Labs Continue To Trade Barbs Over Testing Report Credibility
 
Prevention Core To Palo Alto Networks’ Philosophy

Blog
Mandiant Releases 2014 Annual Report

Mandiant released their 2014 annual report, “M-Trends 2014: Beyond the Breach” today. We found the report to be succinct and informative, so we thought we would share it!
 
Download the report here

Blog
Brian Krebs covers the Target Breach

Our very smart friend and all around hilarious reporter Brian Krebs (KrebsonSecurity) does a great job covering a lot of breaches and issues in information security. We particularly found his coverage of the Target breach to informative and on point, so we wanted to share it with our visitors.

Email Attack on Vendor Set Up Breach at Target

Blog
We find it’s always better to fire people on a Friday….

Note: We received this from a friend in the Omaha security community. We’re not (nor was he) sure if it’s true or not, but it was too funny and serves as a good reminder regardless of authenticity, so we wanted to share.

“We find it’s always better to fire people on a Friday. Studies have statistically shown that there’s less chance of an incident if you do it at the end of the week.”
— Bob Slydell, Office Space

Well, not all the time, Bob. Allow me to explain.

On Friday, November 15, 2013, I started to receive reports of my web server being unreachable for connections originating from outside the central office. I checked my servers in a panic and found all of them were humming along like a satchel of hornets. I checked the connection with my smartphone and saw that my website was indeed unresponsive. I also checked some other work websites and saw that they were unresponsive from the outside too. Checking further, I found that not only were the DNS entries not resolving externally, all traffic was disappearing into an unanswered pit of silence. It took the ISP working a 72-hour weekend shift to fix the issue. The issue? Allegedly a technician was fired on that fateful Friday and decided to play a little real life “Grand Theft Auto: Fiber Seeking Backhoe Expansion Pack” and did some unauthorized excavating at an ISP networking site. The attached picture of the aftermath speaks volumes. Yes, those are unearthed fiber conduits. This also affected many other organizations in the Metro area. I guess it is true that you can only reduce your risks but never eliminate them, even when canning someone on a Friday.

fiber_backhoe

<< Older posts
Translation