Security Awareness: 5 Easy Ways to Detect Spam

By Greg Taylor on Nov 8, 2017 9:50:00 AM

Cybersecurity is an increasingly important business focus. One of the most important pieces of any security solution is making sure your employees have the knowledge and understanding to protect themselves against security threats.

Continue Reading

5 things to consider when choosing the right Firewall for your SMB

By Matt Stephenson on Oct 3, 2017 9:09:00 AM

It's an understatement to say that network and data security is now an essential part of every business. Not a day goes by without news of another data hack our cybersecurity breach. Even small to medium-sized organizations are at significant risk and are oftentimes without adequate defense. For some, it starts with choosing the right firewall and one of the most important decisions is determining the right sized device. Istonish can help! The following considerations are critical to choosing a firewall that will work for your business:

Continue Reading

5 Cybersecurity Recommendations for Government Entities and State Municipalities

By James Mathis on Sep 28, 2017 9:23:00 AM

A recent article by SecurityWeek confirms reports that the U.S. state and federal government's cybersecurity standing is ranked 16th out of 18 industry sectors. Commenting on the report, Sam Kassoumeh, COO and co-founder at SecurityScorecard, said, "On an almost daily basis, the institutions that underpin the nation's election system, military, finances, emergency response, transportation, and many more, are under constant attack from nation-states, criminal organizations, and hacktivists. Government agencies provide mission-critical services that, until they are compromised, most people take for granted." It is very concerning that these critical public sector organizations are some of the most vulnerable to cybersecurity attack.

Istonish is proud to work with the Colorado Statewide Internet Portal Authority (SIPA) to provide Managed IT Services and Security Assessments to Government Entities and State Municipalities. Based on 21 NIST industry standards (grading for impact and urgency), Istonish has created an assessment that not only yields a “point in time” appraisal of the current security profile of the organization, but also a detailed and prioritized list of remediation recommendations. 

Continue Reading

Safe Browsing 101:  How to Protect Employees

By James Mathis on Sep 21, 2017 11:01:00 AM

On the ever-changing cyberthreat landscape, it’s becoming increasingly difficult for businesses to fight cybercrime when the enemies are so diverse—from nation-states to rogue hackers to organized criminal networks. 

Continue Reading

7 Email Best Practices to Keep Employees Safe from Phishing

By James Mathis on Sep 12, 2017 11:15:00 AM

Phishing scams continue to be a growing threat to enterprise security because hackers target the weakest link in any organization—its employees. More than 90 percent of breaches can be attributed to phishing attacks.

Continue Reading

5 Best-Kept Secrets of Managed Security Services

By James Mathis on Sep 5, 2017 3:31:00 PM

A well-kept business secret is a competitive advantage just waiting to be shared. Here’s one you might have missed; managed security service providers (MSSPs) can help you achieve cybersecuritycompliance with less risk, cost and IT impact. Here are the five secrets behind the growing appeal of MSSPs:

Continue Reading

5 Data Backup Tips To Protect Your SMB from Failure

By Al Roesner on Aug 22, 2017 9:15:00 AM

For most small business owners, their enterprise is everything.

Continue Reading

Cybersecurity & Business: Insight for the C-Suite

By Ariel Johnson on Aug 17, 2017 11:15:09 AM

Our IT Security Engineer, James Mathis, sat down with the Cybersecurity Journal to talk lessons for the C-Suite on how Cybersecurity and hacking effect your business in 2017.

Continue Reading

Is UTM Technology Worth the Spend for Your SMB?

By James Mathis on Aug 8, 2017 10:00:00 AM

If you’re running a small to mid-sized business (SMB), you may have been too busy to keep up with all that’s going on in cyberspace, so let’s catch you up: Bad guys wreaking havoc on your network is a real risk.

Continue Reading

To Beat a Hacker, Think Like One: Using the Cyber Kill Chain to Fight Cyberattacks

By James Mathis on Jun 22, 2017 2:41:53 PM

As hackers become more inventive and sophisticated, organizations must up the ante with better cybersecurity. Unfortunately, most cybersecurity still focuses on preventing cyberattacks. 

Continue Reading

Lists by Topic

see all

Posts by Topic

see all

Recent Posts