6330 E. 75th Street, Suite 336Indianapolis, Indiana 46250
(800) 746-4356(317) 251-7920

The Cybersecurity Event of the Year: Black Hat USA 2017

Highlights and Takeaways

  • 27 July 2017
  • Author: TMcShane
  • Number of views: 608
  • 0 Comments

Black Hat 2017

It’s here again! The world’s leading information security conference, held at locations across the globe, made its way to Las Vegas last week. As it wraps up its final day, we’re going to point out some key takeaways and highlights from the event, as well as share some additional sources to explore the briefings more in depth. Also, reports discover some frightening trends in phishing activity. 

Are Internet Rights Beginning to Get Squeezed?

Updates on internet regulation

  • 20 July 2017
  • Author: TMcShane
  • Number of views: 839
  • 0 Comments

Net Neutrality in a Nutshell

Lately, the topic of net neutrality has received a lot of attention. Many people understand the subject to some degree, but this section is going to break down exactly what it is, why it’s important, and who is on either end of the debate. 





Microsoft Blames the NSA

Is Vulnerability Hoarding Safe?

  • 13 July 2017
  • Author: TMcShane
  • Number of views: 695
  • 0 Comments

Microsoft Blames the NSA

Executives at Microsoft made it no secret how they felt about the NSA’s involvement in the recent ransomware attacks that have been sweeping the globe. They condemned the agency for stockpiling vulnerabilities and powerful exploits over the years, which the NSA claims are used to battle terrorism, among other things. The NSA allegedly hid these hacking tools from Microsoft, which ultimately left their customers vulnerable to attack, according to company president Brad Smith. Smith and other experts are bringing attention to the danger that secret information caches like this one held by the NSA pose. If compromised, it empowers criminal groups and hostile nation-states to carry-out global cyberattacks with relative ease, and can send governments and businesses into a panicked frenzy.


 

Cyber Security Training Tips

All employees must be aware of malware dangers

  • 12 July 2017
  • Author: SIM2K
  • Number of views: 0
  • 0 Comments

In our July SIMformation we give you 10 tips for cybersecurity training for companies.  Best practices should start from the first day of a new hire and be a continuous process - no "one class and done" for all employees.  As new threats emerge, companies need to keep employees informed and we give you some guidelines on how to address this.  We also look at how our security partner, Cylance, and their CylancePROTECT® product blocked the release of the latest ransomware attack, dubbed "Petya/Not Petya".  This was a new twist on ransomware as the malware forced a re-boot of the PC that effectively locked it up, rendering it useless to evey try to de-crypt files if the ransom was to be paid.

Our Unified Communications provider, Zultys, has released their MX Meeting web conferencing tool as part of their Cloud-based Hosted Service, making this available to all Zultys users.  And, Microsoft has released a schedule for updates to their Windows Server software, now standardizing on twice-annual updates so companies can plan for these releases.  We look too at Google's attempt to remove the "phone" part of the smartphone, relying on the "computer" side for data and now voice through VoIP rather than using cellular voice services.  Finally, we discuss past successful hack attempts on devices connected to the Internet of Things (IoT) and how security needs to be in place for any device connected to the Internet.

(Not)Petya: A New Strain of Ransomware

CylancePROTECT

  • 6 July 2017
  • Author: TMcShane
  • Number of views: 1022
  • 0 Comments

(Not)Petya: A New Strain of Ransomware


Last Tuesday, organizations across many countries withstood another global ransomware outbreak, and the disruptive experience was all too familiar. This attack was the second in just two months to span multiple countries and compromise hundreds of thousands of machines. As businesses scrambled to secure data and restore backups, cyber-security experts around the world analyzed this new Petya-like threat...


 

RSS

Our Happy Customers

"As a small business, we do not have our own internal IT department. SIM2K® Block Hours offer us a way to get more of the support we need at a lower cost."
-A central Indiana wealth management company

"We've found SIM2K to be an instrumental force in shaping our IT future. Thanks to their SIM2K Block Hours, we've found an effective way to pay for our IT needs as they arise."
-A central Indiana auto auction

"SIM2K has been there for us over the years. They've helped us setup remote access systems, advised us in our continued growth and even helped us restore our patient management software."
-Top rated Indiana surgeon's office

"We were hit by a nasty Internet worm right in the middle of tax season that disabled our server. SIM2K was able to come in and in hours we were back up and running. Their responsive and competent help saved us a lot of time, pain and money."
- A central Indiana accounting firm

"BDA has been utilizing SIM2K consulting services for several years now. We are very pleased with SIM2K's focus on customer service and recently decided to become a SIM2K® Pinnacle customer. We IMMEDIATELY realized the cost benefit to our company! SIM2K Pinnacle has proven to be a great asset to our company..."
- Bill Dunbar and Associates, LLC