Jack Foster

SSH vs VPN – What’s The Difference?

Going online has several risks, ranging from identity theft to theft of cash and other items. Some privacy is important as you surf the Internet. You have a choice of two technologies- VPN and SSH to help enhance some protection and privacy. These two technologies are not competing, but work ... Read More
Joe Goldberg

Challenges of Enterprise Cloud Usage

Businesses report the key advantages of moving workloads to the Cloud are flexibility, agility, easy access to information, and cost savings. Clearly they are taking use of these advantages, as seen in the 2018 State of the Cloud Survey performed by RightScale, they found that 96% of respondents now use ... Read More
John Busso

Protect Your Network with Wireless Security

Around the Millenium when 802.11 was ratified, any measure of security was enough; just having an SSID that was closed was “security”. Then came WEP to stop unauthorized access, however, that was soon cracked. That is why, the IEEE and the WiFi Alliance devised WiFi Protected Access (WPA). Protecting WLANs ... Read More
Matt Pascucci

Vulnerability Assessment versus Penetration Assessment

We get asked this question frequently, “What the difference between a vulnerability assessment and penetration assessment?”. It’s a great question and one we’d like to shed a bit more light on throughout this blog. Both engagements are aimed towards shedding light on areas within your cybersecurity posture that need improvement ... Read More
Jenna Bouvet

What Businesses Should Know About the GDPR

On Data Privacy Day earlier this year, CCSI briefly discussed the implications of The General Data Protection Regulation (GDPR). It is essentially a set of rules imposed by the European Union to give individuals primary control over their personal data. This means that companies will now have to disclose or ... Read More

What Businesses Should Know About GDPR

On Data Privacy Day earlier this year, CCSI briefly discussed the implications of The General Data Protection Regulation (GDPR). It is essentially a set of rules imposed by the European Union to give individuals primary control over their personal data. This means that companies will now have to disclose or ... Read More
Matthew Pascucci

Leadership First, Security Second

We’ve recently seen turnover in the government with a recent void in the Cybersecurity leadership and it lead me to think about how this is being handled in enterprises nationwide. Cybersecurity is more than just technology, hackers, and fancy toys. It’s also about strategy, leadership, and team building, which needs ... Read More
Joe Goldberg

CASB, what is it? Why do I need it? What has it done for me lately?

The first question most people have when they hear the acronym CASB is, “What the heck is this CASB thing?” According to Gartner, a cloud access security broker (CASB) is an on-premises or cloud-based security policy enforcement point that is placed between cloud service consumers and cloud service providers to ... Read More
John Busso

What is an MSSP?

This short blog should provide a sufficient answer to everyone who has heard the term MSSP, but never knew what the heck it was. In 2018, everything is constantly evolving. Whereas smaller companies historically housed all software on their own hardware housed in their own data center, with its own ... Read More
Susan Alexandra

What is Doxxing and How to Avoid It?

Over the course of years, the world of internet has changed a lot. One of the most common thing that has been happening around the internet since its beginning is the ability of being “anonymous”. In fact, impersonating to be anonymous or someone else on the internet has become a ... Read More