<img height="1" width="1" src="https://www.facebook.com/tr?id=1953097804934218&amp;ev=PageView &amp;noscript=1">

Blog

How to Prevent One Employee from Compromising Your Data Security

The former CEO of Equifax this week appeared before Congress to offer testimony around the data breach which, as of last accounting, compromised the personal details of 145.5 million people. Yet again, an organization with the resources, the budget, and the technical knowledge to protect themselves against incursion finds themselves in a pickle of their own making. Most upsetting, though, is the way former CEO Richard Smith perpetuated the myth that "one IT employee" is to blame.

Topics: Security

SOC 2 Report Now Available with Privacy Section

I'm proud to announce that ServerCentral's 2016–2017 AT-101 SOC 2 Type II report is now available to download in our customer portal

Topics: Compliance Security

OS X High Sierra Zero-Day Announced

Normally, passwords stored in a Mac Keychain vault require a master password for access. Now, attackers can steal Keychain passwords without it.

Just hours after the launch of Mac OS X High Sierra, a security researcher has identified and released a zero-day exploit of the new OS revision that can allow an attacker unfettered access to your keychain file. 

Topics: Security

Vulnerability Alert: BlueBorne

Security company Armis has identified eight exploits utilizing the Bluetooth Network Encapsulation Protocol (BNEP) service of mobile devices. 

Topics: Security

Managing Shadow IT Risks by Building IT Resources for the Future

Shadow IT is a double-edged sword: It’s the greatest opportunity for innovation your company has, if the shadow IT risks don’t cut into your business first.

After all, cyber threats will very quickly wipe out any upsides shadow applications can deliver.

Topics: Security Tips

Shadow Technologies Drop Security Risks and Drive Business Value — if You Let Them

Shadow technologies can send a chill down the spine of any IT professional tasked with keeping an organization secure.

Topics: Security Tips

Three Benefits of Shadow IT — And How to Harness Them

What is shadow IT?

It helps to first define shadow IT, sometimes known as dark IT. Most would start with a rundown of the network security risks it presents, but a more helpful shadow IT definition would explain it as something that’s already happening in your organization.

Topics: Security Tips

Mitigating BlackNurse Denial-of-Service Attacks

In 2016, every company, no matter the size, has an online presence. Whether that is a website, online store front, perhaps a mobile app, or a mail server, chances are your organization has some kind of system in production on the Internet.

Topics: Support Security

ServerCentral's 2016 SOC 2 audit is now available!

Throughout many years of managing audit tasks and compliance programs, the most arduous part has always been gathering the proper artifacts.

  • Did we get the screen shot of one system right?
  • Where did I put that report from our vendor?
  • Who’s seen the monthly vulnerability scan reports?

Well, today ServerCentral took a large step toward making that process easier for our customers by putting our SOC 2 report online in our customer portal! 

Topics: Compliance Security Audit

The End of Safe Harbor And What Comes Next

Under European law, service providers are legally obligated to maintain the levels of security and privacy for personal, non-public information. Because of these protections, data from European users cannot be moved to jurisdictions where the same level of protection does not exist.

Topics: Security