Ask SWC: How Can You Protect Your Organization From An IT Security Breach?

August 7, 2014   //   Security, , , , , , , ,

The bad guys are winning as today’s cyber threats have evolved past our current security solutions. Watch my “Ask SWC” video to learn more about the recent security threats that corporations like PF Chang’s and Target have suffered and how you can protect your organization from a security breach.

Ask SWC Technology Partners

On June 9th a large bunch of credit cards were posted on an online fraud site. Almost immediately after they were posted, credit card companies started detecting fraudulent activity was happening on these cards. They then looked into what all of the commonalities were on these cards and what they found was that every credit card had been used at a PF Chang’s branch. Fast forward to today and PF Chang’s has actually disclosed that thirty three of their restaurants were hit by this cyber-attack. The PF Chang’s attack looks like a lot of other security breaches we have seen in the past, such as the Target security breach, where credit card numbers were stolen and posted on an online site.

The big question is, what can your organization do to protect yourself from a security breach and this type of malware? Traditional signature based antivirus software is no longer effective at detecting these types of attacks and other security threats such as botnets and Crypto-Locker. What you should be using is behavioral based protection to keep your organization safe. The leader in this space is FireEye, a next generation threat protection platform that stops advanced malware and zero-day attacks. FireEye does this by running the malware in a virtual environment and looks for any type of malicious activity a payload may do. FireEye even detected the Target attack before any of the data was stolen, but what most people don’t know is that Target failed to respond to the alerts – a billion dollar mistake!

If you are interested in learning more about FireEye and deploying next generation security solutions to help keep your organization’s data safe, please join us for our next Security 2.0 Luncheon. Tommy Montgomery, CISSP, ISSMP, CISM, GCFW and Certified Ethical Hacker will discuss next generation security solutions, tools and tactics that will help keep your organization safe from today’s cyber threats.

Related Blog Posts

If you enjoyed this blog post from Tommy on SWC’s security solutions, please check out a few of our past related security posts:

Security Awareness: Tips for Protecting Your Online Identity from Hackers
CryptoLocker Virus Tips – Take Action Now!
Heartbleed Is Much Worse Than We Thought
Tell Me About The Heartbleed Bug
SWC Discusses Target Security Breach On Telemundo News Broadcast
How Can A Company Move To The Cloud With Privacy Needs?
Ask SWC: What Are Some Tips To Protect Your Network From Hackers?
What Does Microsoft’s Windows XP Anti-Malware Extension Mean?
The Fundamentals of Cyber Security
SWC’s Beers With Brad – Technology, Security And Privacy

Ask SWC Blog Posts

If you enjoy our “Ask SWC” video blog series, please check out a few of our past posts:

Ask SWC: What’s XLCubed?
Ask SWC: What is Microsoft System Center Orchestrator
Ask SWC: When It Comes To Custom Application Development What Sets SWC Apart From The Competition?
Ask SWC: What’s New in SQL Server 2014?
Ask SWC: What Is Microsoft System Center Data Protection Manager?
Ask SWC: What Is Unified Device Management?
Ask SWC: What Are Some Cool New Features of Microsoft Dynamics CRM 2013?
Ask SWC: What Is The SharePoint Envisioning Process?
Ask SWC: What is User Enablement Training?
Ask SWC: Salesforce Goes Social with Chatter