Password Safety Infographic - How to Create Secure and Protected Passwords

By James Mathis on Jul 24, 2017 10:36:00 AM

Need a quick, visual explaination of Password Safety: How to Create Secure and Protected Passwords? Look no further!

Continue Reading

5 Reasons Why We, At Istonish, Love Doing Business in Colorado!

By Steven Brier on Jul 14, 2017 9:31:31 AM

At Istonish, our singular goal is to help individuals, organizations, and our community be great. We just happen to use technology to do that.

Continue Reading

New Istonish Website and More!

By Steven Brier on Jun 26, 2017 3:28:00 PM

If this is your first time visiting our blog, welcome. If you’re returning, welcome back.  We’ve made some changes! 

Continue Reading

To Beat a Hacker, Think Like One: Using the Cyber Kill Chain to Fight Cyberattacks

By James Mathis on Jun 22, 2017 2:41:53 PM

As hackers become more inventive and sophisticated, organizations must up the ante with better cybersecurity. Unfortunately, most cybersecurity still focuses on preventing cyberattacks. 

Continue Reading

Nine Indicators of Compromise a Cyber Threat Assessment Will Help You Uncover

By James Mathis on Jun 13, 2017 11:09:18 AM

Your network has probably been breached. You just don’t know it yet. That is the nature of cyber attacks, many of which lie dormant and undiscovered for far too long. In 2016, Verizon published in its Data Breach Investigations Report (DBIR) that a whopping 83% of compromises took weeks or longer to discover.

Continue Reading

5 Cybersecurity Lessons Learned from WannaCry

By James Mathis on Jun 12, 2017 2:31:13 PM

The hype over the WannaCry ransomware attacks in mid-May that ultimately disrupted 300,000 systems in over 150 countries has died down. Nonetheless, it is thought to be the largest ransomware attack recorded to date; taking the British National Health Service as one of its first and most severely assaulted victims.

Continue Reading

From Disclosure to Comprehension: Mitigating Risk in a Fiduciary World

By Annette Quintana on May 25, 2017 11:43:37 AM

Since the Investment Company Act and Investment Advisers Act, the U.S. Securities and Exchange Commission has required organizations engaged primarily in investing and trading stocks to provide full disclosure about theirinvestment objectives, while minimizing conflicts of interest. Since then, disclosure has been a prominent tool in the investor-protection arsenal of regulators around the world. Unfortunately, though, as many regulators have found, clear and proper disclosure doesn’t always produce the desired result of protecting retail investors as they navigate a world of increasingly complex financial products.

Continue Reading

Rise of the Cloud-First Enterprise

By James Mathis on May 23, 2017 8:30:00 AM

Businesses are moving to the cloud in droves, but few are monitoring and protecting data in the cloud with the same vigilance they apply to their physical network environments. To keep mission-critical data and applications safe, businesses must avoid four big risks as they make the move.

Continue Reading

3 Signs You're Ripe for a Ransomware Attack

By James Mathis on May 18, 2017 9:00:00 AM

2016 saw a surge in ransomware attacks. There were four times as many total attacks as in 2015. In 2017, the problem will get worse with experts estimating there will be a 25% increase in new ransomware families, providing more opportunities for hackers.

Continue Reading

Open Season: Tips for a Successful Threat Hunt

By James Mathis on May 16, 2017 11:15:00 AM

There’s a hunt where you don’t need a license, it is never out of season and permits the use of every weapon at your disposal to bag your prey. It’s the threat hunt.

Continue Reading