<img height="1" width="1" src="https://www.facebook.com/tr?id=1953097804934218&amp;ev=PageView &amp;noscript=1">

Blog

ServerCentral Security Update II re: x86 Architecture CPU Issues

The past few days have proven to be quite eventful, as you can imagine.

Topics: Security

ServerCentral Security Update re: x86 Architecture CPU Issues

I’m sure everyone is now aware of the Intel CPU bugs and exploits that have been publicized over the last 36 hours.

Topics: Security

How to Prevent One Employee from Compromising Your Data Security

The former CEO of Equifax this week appeared before Congress to offer testimony around the data breach which, as of last accounting, compromised the personal details of 145.5 million people. Yet again, an organization with the resources, the budget, and the technical knowledge to protect themselves against incursion finds themselves in a pickle of their own making. Most upsetting, though, is the way former CEO Richard Smith perpetuated the myth that "one IT employee" is to blame.

Topics: Security

SOC 2 Report Now Available with Privacy Section

I'm proud to announce that ServerCentral's 2016–2017 AT-101 SOC 2 Type II report is now available to download in our customer portal

Topics: Compliance Security

OS X High Sierra Zero-Day Announced

Normally, passwords stored in a Mac Keychain vault require a master password for access. Now, attackers can steal Keychain passwords without it.

Just hours after the launch of Mac OS X High Sierra, a security researcher has identified and released a zero-day exploit of the new OS revision that can allow an attacker unfettered access to your keychain file. 

Topics: Security

Vulnerability Alert: BlueBorne

Security company Armis has identified eight exploits utilizing the Bluetooth Network Encapsulation Protocol (BNEP) service of mobile devices. 

Topics: Security

Managing Shadow IT Risks by Building IT Resources for the Future

Shadow IT is a double-edged sword: It’s the greatest opportunity for innovation your company has, if the shadow IT risks don’t cut into your business first.

After all, cyber threats will very quickly wipe out any upsides shadow applications can deliver.

Topics: Security Tips

Shadow Technologies Drop Security Risks and Drive Business Value — if You Let Them

Shadow technologies can send a chill down the spine of any IT professional tasked with keeping an organization secure.

Topics: Security Tips

Three Benefits of Shadow IT — And How to Harness Them

What is shadow IT?

It helps to first define shadow IT, sometimes known as dark IT. Most would start with a rundown of the network security risks it presents, but a more helpful shadow IT definition would explain it as something that’s already happening in your organization.

Topics: Security Tips

Mitigating BlackNurse Denial-of-Service Attacks

In 2016, every company, no matter the size, has an online presence. Whether that is a website, online store front, perhaps a mobile app, or a mail server, chances are your organization has some kind of system in production on the Internet.

Topics: Support Security