Data Breaches Are A Growing Epidemic: No One Is Safe

For the past few years, there has been a constant stream of data breaches that have hit the headlines, ranging from the theft of medical information, account credentials, corporate emails, and internal sensitive enterprise data. When a data breach occurs, companies will usually haul in third-party investigators, notify regulators, promise to do better, and give […]
The Difference Between a Next Generation Firewall and a UTM Appliance

Data security remains the most critical cybersecurity issue on the map today. It’s now standard to employ some firewall type on every system, most commonly a next-generation firewall (NGFW). However, another multipurpose option is available: a unified threat management (UTM) appliance. With the increasing need for more secure and reliable systems, many companies seek high-end […]
4 New Wormable WINDOWS Flaws Discovered

Microsoft RDP Patches: CVS(s); CVE-2019-1181 | CVE-2019-1182 Windows Systems affected: Windows 7 SP1 + Windows Server 2008 R2 SP1 + Windows Server 2012 + Windows 8.1 + Windows Server 2012 R2, and all supported versions of Windows 10, including server versions. Systems not affected: Windows XP, Windows Server 2003, and Windows Server 2008 Contact us […]
Volico Data Centers Completed its 2019 SOC 2 Type 2 Audit for Its Data Center Portfolio

Volico Data Centers is proud to announce the completion of the SOC 2 Type II audit for 2019. A-LIGN, an independent accounting, and auditing firm performed the audits and confirmed Volico’s compliance with these industry standards. The compliance reports assure that Volico Data Centers’ services are suitable for businesses and applications that require high security, […]
Micro Segmentation vs Endpoint Protection: What You Need to Know

When protecting endpoints from malware or any type of command and control based Malcode (malicious code), many different approaches and techniques are utilized by the software an organization or enterprise chooses to utilize in order to protect the machines in their environment. Different solutions to safeguard endpoints include on-site binary isolation, server-based micro-virtualization, real-time system-isolation, […]
Cryptographic Ransomware Removal And Protection With Volico Endpoint Protection

Crypto Ransomware is rampant. Most variants of it (CryptoLocker, TeslaCrypt) are malicious binary files that are very intelligent, aware of their surroundings, and highly polymorphic. Cryptographic ransomware that can morph on the fly makes it extremely difficult for standard signature-based antivirus programs to detect, as well as making it difficult to detect with “Anti-Malware” programs. […]
Discover How Volico Can Protect Your Business Against Microsoft’s RDP BlueKeep Exploit

For the may 2019 security patch release, Microsoft included a patch for a RCE (remote command exec) bug in the remote desktop service (RDP). This was to fix an exploit where an unauthenticated attacker would send “core-system” malformed and malicious RDP messages to the target server using system-level message service to the MS_T120 protocol of […]
How to Select an MSSP Partner?

An MSSP (Managed Security Services Provider) Partner is chosen by organizations for several reasons like security, talent shortage, budget cuts and the complexity of trying to stay on top of fledgling threats arising in the world of tech. Here are five areas you need to focus on to select an MSSP partner. The following are […]
Vulnerability Assessment vs. Penetration Test

It is quite a common problem to pay for network penetration testing services and getting a hundred pages penetration testing report listing the vulnerabilities detected by a scanning tool. Vulnerability assessments are often offered in place of penetration tests. But what is the difference? Vulnerability Assessment A vulnerability assessment intends to identify certain weaknesses in […]
Why Are Cybercriminals Targeting Educational Institutions

Last year saw a sharp increase in the number and impact of cyber attacks on educational institutions across the US. While healthcare and financial industries have always been prime targets, cyber criminals seem to be turning more to learning institutions as targets for hacking. It is not just criminals prepared to sell your information on […]