James Mathis

James Mathis is a Systems Administrator at Istonish.

Recent Posts

Fortinet's Accelerate Conference

By James Mathis on Mar 13, 2018 9:33:00 AM

Istonish is proud to partner closely with Fortinet to provide comprehensive security solutions for our clients. This includes next generation firewalls, cloud security, SIEM and much, much more. I attended Fortinet’s Accelerate Conference last week in Las Vegas and have outlined several key takeaways and highlights from the conference:

Continue Reading

5 Security Trends to Keep Top of Mind in 2018

By James Mathis on Feb 1, 2018 9:04:27 AM

1. Security Awareness

Security awareness may be the single most important thing you can do to protect your employees and your organization. In 2017, 90% of security attacks where phishing attacks. This points to the fact that your employees can become your biggest tool in preventing future cyber attacks. Security Awareness training should be mandatory at your organization, this not only helps keep your business safe, it will keep your employees safer at home. Come up with a way to make the Security Awareness training fun and steer clear of self-paced video or ”death by powerpoint” and cover topics that can be utilized outside of work as well:

Continue Reading

5 Cybersecurity Recommendations for Government Entities and State Municipalities

By James Mathis on Sep 28, 2017 9:23:00 AM

A recent article by SecurityWeek confirms reports that the U.S. state and federal government's cybersecurity standing is ranked 16th out of 18 industry sectors. Commenting on the report, Sam Kassoumeh, COO and co-founder at SecurityScorecard, said, "On an almost daily basis, the institutions that underpin the nation's election system, military, finances, emergency response, transportation, and many more, are under constant attack from nation-states, criminal organizations, and hacktivists. Government agencies provide mission-critical services that, until they are compromised, most people take for granted." It is very concerning that these critical public sector organizations are some of the most vulnerable to cybersecurity attack.

Istonish is proud to work with the Colorado Statewide Internet Portal Authority (SIPA) to provide Managed IT Services and Security Assessments to Government Entities and State Municipalities. Based on 21 NIST industry standards (grading for impact and urgency), Istonish has created an assessment that not only yields a “point in time” appraisal of the current security profile of the organization, but also a detailed and prioritized list of remediation recommendations. 

Continue Reading

Safe Browsing 101:  How to Protect Employees

By James Mathis on Sep 21, 2017 11:01:00 AM

On the ever-changing cyberthreat landscape, it’s becoming increasingly difficult for businesses to fight cybercrime when the enemies are so diverse—from nation-states to rogue hackers to organized criminal networks. 

Continue Reading

7 Email Best Practices to Keep Employees Safe from Phishing

By James Mathis on Sep 12, 2017 11:15:00 AM

Phishing scams continue to be a growing threat to enterprise security because hackers target the weakest link in any organization—its employees. More than 90 percent of breaches can be attributed to phishing attacks.

Continue Reading

5 Best-Kept Secrets of Managed Security Services

By James Mathis on Sep 5, 2017 3:31:00 PM

A well-kept business secret is a competitive advantage just waiting to be shared. Here’s one you might have missed; managed security service providers (MSSPs) can help you achieve cybersecuritycompliance with less risk, cost and IT impact. Here are the five secrets behind the growing appeal of MSSPs:

Continue Reading

Is UTM Technology Worth the Spend for Your SMB?

By James Mathis on Aug 8, 2017 10:00:00 AM

If you’re running a small to mid-sized business (SMB), you may have been too busy to keep up with all that’s going on in cyberspace, so let’s catch you up: Bad guys wreaking havoc on your network is a real risk.

Continue Reading

Password Safety Infographic - How to Create Secure and Protected Passwords

By James Mathis on Jul 24, 2017 10:36:00 AM

Need a quick, visual explaination of Password Safety: How to Create Secure and Protected Passwords? Look no further!

Continue Reading

To Beat a Hacker, Think Like One: Using the Cyber Kill Chain to Fight Cyberattacks

By James Mathis on Jun 22, 2017 2:41:53 PM

As hackers become more inventive and sophisticated, organizations must up the ante with better cybersecurity. Unfortunately, most cybersecurity still focuses on preventing cyberattacks. 

Continue Reading

Nine Indicators of Compromise a Cyber Threat Assessment Will Help You Uncover

By James Mathis on Jun 13, 2017 11:09:18 AM

Your network has probably been breached. You just don’t know it yet. That is the nature of cyber attacks, many of which lie dormant and undiscovered for far too long. In 2016, Verizon published in its Data Breach Investigations Report (DBIR) that a whopping 83% of compromises took weeks or longer to discover.

Continue Reading

Lists by Topic

see all

Posts by Topic

see all

Recent Posts