Naples, FL, USA
Jun 4, 2019 | By New Net Technologies
Quest Diagnostics said Monday that 11.9 million Quest Diagnostics patients may have had their personal, financial, and medical exposed in a data breach that happened through a contractor of a contractor. Quest outsources its billing collections to Optum360, which in subsequently used American Medical Collection Agency (AMCA) for such services, and were both notified by AMCA of a security incident on May 14.
May 24, 2019 | By New Net Technologies
In the cybersecurity world, testing for the existence of exploitable vulnerabilities isn’t always an exact science. Checking for open ports (CIS Control 9 - Limitation and Control of Network Ports, Protocols and Services) sounds simple enough, but the reality is a long way off.
May 23, 2019 | By New Net Technologies
Nearly all organizations, regardless of size, struggle with configuration management and change control. The need to review and approve changes in advance of making them, to formulate impact analysis, testing procedures and contingency plans all serves to slow things down. It’s no wonder most IT professionals acknowledge the potential benefits of Change Control, but simply do nothing about it.
May 17, 2019 | By New Net Technologies
New research from Forescout found that healthcare organizations are increasingly at risk from legacy platforms, device complexity, and the use of frequently exploited protocols. Forescout analyzed 75 healthcare deployments running over 1.5 million devices across 10,000 VLANs (virtual local area networks).
May 14, 2019 | By New Net Technologies
Equifax has incurred losses of over $1.35bn so far following the devasting 2017 data breach involving the breach of 145 million customers personal financial data. In the attack, hackers exploited a known security vulnerability that Equifax had left unpatched and compromised the personal and financial details of more than half of all Americans and millions on UK consumers. The known Apache Struts 2 flaw which caused this breach was left unpatched for over 2 months after a patch was issued.
Jan 21, 2019 | By New Net Technologies
Given the latest WannaCry Ransomware epidemic, which infected more than 230,000 users in over 150 countries, it’s vitally important that organizations fully understand the risks associated with using out-of-date systems and software.
Jan 1, 2019 | By New Net Technologies
Without our help, controlling changes can be one of the biggest challenges facing multi-functional IT Teams. The size of task, process, and coordination of effort often means that changes continue to occur outside of any planned change approvals and the IT team is unable to prevent this from continuing. The solution? NNT’s Managed Change Control Program.
Dec 1, 2018 | By New Net Technologies
In early 2017, NNT assembled a panel of experts to discuss the increased importance of applying the Center for Internet Security Controls as part of a modern approach to cyber security. The session also highlighted the benefits of combining the CIS Controls with ongoing, real-time compliance monitoring.
Nov 1, 2018 | By New Net Technologies
Some of us will need therapy during and after an audit - that’s not unusual - but can a Compliance Audit really bring about the same feelings as other forms of grief? Furthermore, if this really is the case then, by extension, could we coach ourselves through the compliance audit process to become more effective at dealing with future audit situations?
Oct 1, 2018 | By New Net Technologies
Right now, Ransomware is the Great White Shark of cyber-attacks, the most feared malware of all, and both corporate and home users are running scared. And rightly so - Anyone who has had experience with Ransomware, will attest to the agony and disruption. But instead of worrying about an attack, what action can be taken to safely venture back into the water and not necessarily “with a bigger Boat”?
May 20, 2019 | By New Net Technologies
NNT now offer intgeration with the world leading ITSM solutions from Cherwell to deliver Closed Loop, Change Control. What this means is that approved Changes are validated automatically, with a full audit trail of what actually changed, and this all gets reconciled with your Change Requests.
Feb 27, 2019 | By New Net Technologies
SecureOps combines established best practices for security and IT service management to deliver a holistic and comprehensive solution that identifies and highlights unknown, unwanted and potentially malicious events in real-time…without all the NOISE and headaches of endless alerts.
Feb 27, 2019 | By New Net Technologies
File Integrity Monitoring (FIM) is a foundational control that involves analyzing operating system and application software files to determine if and when they have changed, how they changed and who made the change using a verification method between a current file state and a known baseline.