Home > Resources > Blog
Oct
Update from Amazon’s CISO on Public Cloud Security At Amazon’s recent re:Invent cloud conference held in Las Vegas, NV; Chief Information Security Officer (CISO) Steve Schmidt spoke about the state of public cloud security for the enterprise in relation to Amazon Web Services. “Enterprise Security is not where it needs to be” stated Schmidt in his opening remarks. Security in the cloud creates challenges not seen in traditional on-premises customer environments. The biggest […]
Read moreOct
Our CEO Joe Asady recently attended the Gartner IT Symposium/ITexpo in Orlando, FL. Gartner Symposium is the world’s largest gathering of IT leaders and senior executives with a focus on interactive sessions that empower CIOs to share best practices and drive change through their business. Netfast’s Cloud Managed Services offering is focused enabling Mid-Tier New York City customers to accelerate Digital Business Transformation with Managed Cloud and Mobile solutions including: Cloud Backup and […]
Read moreOct
There has been a significant increase of late in cyber attacks. In fact, the FBI now ranks cyber crime as one of its top law enforcement activities. In the recent budget proposed by President Obama, he said that he would drastically raise the United States’ spending on cyber security to $15 billion annually. From fraud and identity theft to commercial hacking assaults, cyber security has never been so important for governments, businesses […]
Read moreSep
Many HIPAA covered entity continue to maintain their own data center forgoing the cloud to ensure they remain within compliance requirements. For highly regulated industries including healthcare with strict HIPAA requirements there are barriers and challenges to Cloud Migration. How can healthcare providers achieve a balance between meeting the requirements of being a covered entity and taking advantage of the benefits of Private/Public/Hybrid cloud migration? To help healthcare providers learn how to verify […]
Read moreSep
To ensure a successful migration to the cloud and Office 365 you have to get the settings and administrative functions right. Office 365 defaults are setup for the majority of companies but do not provide protection for email in regards to malware and sensitive information. In addition to security concerns many of Office 365’s productivity boosters are not realized with maintaining default settings. Here are some tips from Netfast Cloud Managed […]
Read moreSep
How can I improve Public Cloud Security? Also is the Public Cloud secure enough for my business critical application? The answer is yes you can and yes it is. VPN enabled public clouds such as Amazon Web Services and Rackspace are layer one of security for established SMB companies looking to migrate their applications to Public Cloud but beyond that a full-security plan to ease concerns may include. 6 Steps to Improve Public […]
Read moreSep
In a recent report from Forrester, Amazon Web Services was named the industry leader in Cloud Security. The report cities Amazon’s capabilities in Data Center Security, Certifications and Network Security along with best-in-class customer support, security partnerships and economy of scale. Additional Key Takeaways Public Cloud Platforms Provide Certifications That Significantly Enhance Workload Security Today’s economic environment is forcing S&R professionals to consider alternatives to on-premises security solutions to secure their cloud […]
Read moreSep
According to a recent Symantec report entitled “2015 Internet Security Threat Report”, 60% of all targeted attacks impacted small and medium-sized businesses (SMB), many of which were not prepared and lacked security practices. At netfast, we are seeing more and more attacks targeting SMBs at a rapid rate. It is vital that SMBs have a plan and security implemented to thwart off these attacks. Security needs to be a priority […]
Read moreAug
CrytoLocker is malware cyber criminals use to encrypt the contents of a computer until users pay up. But that’s only one type of cyber extortion. Criminals can also threaten to shut down computer systems or erase data, to infect a company with a virus, to publish proprietary information or personally identifiable information of customers or employees, launch a denial-of-service attack, or hold social media accounts hostage. Criminals can also start the […]
Read moreAug
Welcome to Cyber Security News Roundup, our weekly news roundup of stories related to Cyber Security Threats. Cyber Security Weekly will provide the latest in news regarding Zero Day Threats, Firewall and Perimeter protection, along with new and interesting ways hackers are finding their way into your environment. To get the latest news please return here or you may also get the latest in your inbox by signing up below. […]
Read more