• Skip to main content
  • Skip to footer

Solid State Systems LLC

Tailored IT Solutions for Modern Businesses

  • Home
  • About Us
  • Our Services
    • Cloud
    • CTO/CIO
    • Unified Communications and Collaboration
    • Infrastructure Management
    • Network Management
    • Managed Services
    • IT Security
      • Cyber Intelligence and Penetration Testing
    • Disaster Recovery
  • Blog
  • Contact Us

security

User Access Management: How to Make It Work with These 5 Tips

Protect your small business network security and know who has access to your sensitive data.

Are you giving your employees access to sensitive information they don’t need to see? If so, you could be putting your business at serious risk. A report from the Ponemon Institute revealed that 62% of end users say they have access to company data they shouldn’t see and that only 29% of IT respondents say their companies enforce a strict least privilege model. What’s the result of giving your employees too much access? In the State of Cybersecurity and Digital Trust 2016, researchers found that 69% of enterprise security professionals said they experienced the theft or corruption of company information by insiders. That’s where user access management comes in. It’s one of the best tools you can use to protect your … [Read more...] about User Access Management: How to Make It Work with These 5 Tips

Filed Under: Tips and Advice Tagged With: infrastructure management, IT planning, risk mitigation, security

5 Security Advantages of IT Penetration Testing

IT penetration testing can stop persistent hackers by identifying your security holes and protecting your network.

Can your system stop a modern-day hacker? Have you tested it? Are you just relying on intuition and assume your security measures are the best they can be? Unfortunately, many companies do believe they’re protected against malicious cyberthreats without any evidence to back up their claims. And if we’re being honest, they’re probably unsure about the safety and efficacy of their security network. You probably are too. That’s why IT penetration testing is such a useful tool for uncovering and patching hidden weak points in your system before a hacker can exploit them. We’ll show you what penetration testing is all about, the many advantages of penetration testing for the security of your business, and how to implement … [Read more...] about 5 Security Advantages of IT Penetration Testing

Filed Under: Tips and Advice Tagged With: infrastructure management, IT planning, risk mitigation, security

Healthcare Data Security: Proven Solutions to Major Problems

Healthcare facilities are being heavily targeted by hackers, making healthcare data security a major concern

2015 was the “year of the healthcare breach.” There were 5 mega-breaches which resulted in over 100 million patient records being exposed, according to IBM’s X-Force Threat Intelligence Report 2016. And healthcare data security didn’t fare any better in 2016. According to Symantec’s 2017 Internet Security Threat Report (ISTR), the number of reported breach incidents increased by 22 percent last year, rising to 328 from 269 in 2015 - with healthcare being the 2nd most attacked service in the “Services” industry category. 2016 was also the year of email cyberattacks on healthcare. Symantec’s 2017 ISTR found that 54% of their emails contained spam, 1 in 4,375 emails were phishing attempts, and the number of email-borne … [Read more...] about Healthcare Data Security: Proven Solutions to Major Problems

Filed Under: Tips and Advice Tagged With: loss prevention, network, risk mitigation, security

4 Remote Access Risks and How to Solve Them

Remote access risks pose a serious threat to your business, but they can be prevented.

Remote access risks were responsible for 88% of all hacking breaches and 95% of malware incidents in 2011. These overwhelming facts come from the 2012 Data Breach Investigations Report conducted by the Verizon RISK team in coordination with the United States Secret Service and a handful of other international law enforcement agencies. If any of your employees are working remotely, you’re in danger. But it’s easy to ignore remote access risks when the benefits are so appealing: You save money on travel costs and office space Your employees can always meet deadlines, even if they’re sick at home Your employees may be more productive in their own home without everyday distractions in the office (unnecessary meetings, work … [Read more...] about 4 Remote Access Risks and How to Solve Them

Filed Under: Tips and Advice Tagged With: network, risk mitigation, security, software

How to Prevent Spam with 6 Proven Tips

Learning how to prevent spam is a critical step in protecting your company’s data

In 2014, a whole new method for spamming began to emerge - Snowshoe Spam. It works like this: Spammers use botnets to send a huge amount of spam at a low volume per IP address, which makes it harder to prevent. According to Cisco, snowshoe senders increased from 7% in 2013 to 15% in 2014. Of course, anti-spam technology and security companies who learn everything they can about how to prevent spam started improving their defenses against snowshoe - which encouraged spammers to update and improve their techniques… In 2016, the Cisco Talos and Umbrella research teams identified an evolved version of snowshoe known as “hailstorm.” Hailstorm still relies on a large army of botnets that send a low volume of spam per IP … [Read more...] about How to Prevent Spam with 6 Proven Tips

Filed Under: Tips and Advice Tagged With: email, how to, risk mitigation, security

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Go to page 5
  • Go to Next Page »

Footer

Connect with Us

  • Facebook
  • LinkedIn
  • Twitter

Copyright© 2023 Solid State Systems LLC · 244 Fifth Avenue, STE 2478, New York, NY 10001 · +1 646 783 4096 · info@solidsystemsllc.com