Blog - Partners

Blog

How do SME’s Fight off CyberAttacks?

(Carbon Black) Does the fact that well-known brands are successfully attacked and breached mean that SMEs are even more at risk? If SMEs can defend themselves, how should they go about doing so? We will look to address these questions ... »

Brute Force: Anatomy of an Attack, Varonis

The media coverage of NotPetya has hidden what might have been a more significant attack: a brute force attack on the UK Parliament. While for many it was simply fertile ground for Twitter Brexit jokes, an attack like this that targets a ... »

#SecurityTipTuesday: Provide Training on Cyber Threats

Let’s think back for a second on all the safety lessons we were taught as kids; for example, when you cross a street, you look both ways. It’s so obvious right… Wrong. Cybersecurity awareness training is no different than the ... »

Breaking news: here’s what we know about what could be the latest ‘Petya’ ransomware outbreak

A significant ransomware attack called Petya is spreading across Europe, Russia, Ukraine and elsewhere. What we know right now Victims so far include British advertising agency WPP (WPPGY), Danish shipping firm Maersk, Russian oil/gas company Rosneft and U.S.-based pharmaceutical firm Merck. ... »

Camp Secure Sense 2017 – Recap

Wow, what a week! Camp Secure Sense has come and gone and reflecting back this was one fantastic group of customers and sponsors that attended. We’ve said it before, and we will say it again, without you there would be no ... »

Adylkuzz Malware That Could Spread More Than WannaCry

The last few days have been understandably exhausting for security teams around the globe due to the nasty ransomware WannaCry or WannaCrypt. The malware spread widely using an exploit for a Server Message Block v1 vulnerability (MS17-010) leaked by the ... »

Network Access Control: Is it Dead? The History of NAC and How the Evolving Cybersecurity Industry Changed It via Bradford Networks

As enterprise organizations continue to add BYOD, IoT devices, virtual servers/cloud services, switches, routers and offices that are connected and sharing information throughout the globe, the task of identifying and securing these endpoints can seem overwhelming. To manage these trends, ... »

Top 3 Myths of Security Awareness Training

Security Mentor has been at this a while – teaching, educating and training companies worldwide about how to work smart and securely – and in the process, transforming employee attitudes towards security. Across a wide range of industries and unique business ... »

Ten Practical Steps to Protect Your Online Privacy via Cylance

Two things happened recently which should raise an alarm for anyone concerned about their online privacy. The first was a major release by WikiLeaks on March 7, 2017 of a trove of hacks and hacking techniques allegedly employed by the CIA ... »

Bug Bounties: Risk and Reward

Today BugCrowd CEO, Casey Ellis, and founder and attorney at Cipher Law, James Denaro stepped on stage at AppSecUSA 2016 to talk about the logistics and legalities of bug bounties. They talked through some of the most common concerns people ... »

Insider Threats, What and Why You Should Be Concerned

Did you know, that insider threats have been behind the sharp increases over the past 18 months in the percentage of organizations that have experienced loss or theft of company data? According to the Ponemon Institute, three out of every ... »

iSNS Server Memory Corruption Vulnerability in Microsoft Windows Server

In November 2016, as part of Fortinet’s FortiGuard research work, it was discovered and reported an iSNS server memory corruption vulnerability in Microsoft Windows Server. On patch Tuesday of March 2017, Microsoft released the Security Bulletin MS17-012 that contain the ... »

RSA 2017 Predictions Analysis via Sophos

Sophos offered a predictions blog that was published on their Naked Security blog last week, and now it’s time to see how accurate these predictions were. Here, we will break down each prediction and see what really happened. Sophos wrote ... »

Secure Sense Named 2016 LogRhythm Partner of the Year Canada

Burlington, ON,  February 28, 2017 – Secure Sense, Canada’s fastest growing IT Security company, is pleased to announce it has been named LogRhythm’s 2016 Partner of the Year, Canada. The announcement was made at the LogRhythm Partner Summit, held in Boulder, ... »

2017 Network Security Trends Infographic

As you plan for 2017, get the facts on endpoint security and stay current on the trends. This Infographic compiles relevant data from Gartner, IDC, The Ponemon Institute, Symantec and others, on the current state of network security threats from ... »

Not all ransomware tools are created equal

In case you hadn’t heard, ransomware is big, big business. In 2016 alone, ransomware payouts are closing in on the billion-dollar mark, with a whopping 70% of companies reporting that they paid to have their maliciously-encrypted data liberated after being ... »

What’s Happening at #RSAC17

Will you be attending RSA in San Francisco this February? If so, we have the lowdown on all the exciting things our partners have planned for IT’s biggest event. From dinner parties to beer and ping pong, your go-to guide is ... »

When Robots Go Rogue – Cylance Identifies What’s Real in AI

Westworld… J.A.R.V.I.S.… Knight Rider… seems like we’ve been surrounded by artificial intelligence (AI) for a long time, doesn’t it? Thanks to Cylance we’re able to make sense of and understand exactly what Artifical Intelligence and Machine Learning really are. As other ... »

Make PCI DSS Compliance Easier with Bradford Networks

Organizations that accept credit card payments must meet the Payment Card Industry Data Security Standard (PCI DSS) compliance standards for securing payment information wherever it is collected, transmitted or stored. In today’s BYOD world, ensuring that mobile devices, IoT connections ... »

Not all ransomware tools are created equal

In case you hadn’t heard, ransomware is big, big business. In 2016 alone, ransomware payouts are closing in on the billion-dollar mark, with a whopping 70% of companies reporting that they paid to have their maliciously-encrypted data liberated after being ... »

How to Stay Protected Against Ransomware

Businesses large and small are under threat from increasingly aggressive and brutal ransomware attacks. Loss of access to critical files, followed by a demand for payment can cause massive disruption to an organization’s productivity. But what does a typical attack ... »

Begin With the End(point) in Mind

Advances in artificial intelligence (AI), machine learning (ML), and mathematical algorithms have allowed cyber security professionals to bolster their threat prevention in recent years. SecOps groups have shifted focus from response to prevention, using AI/ML-powered protection products such as CylancePROTECT® to ... »

Lesson Learned: Security Awareness Training

Think back for a second on all the safety lessons we learned as kids; for example, when you cross a street, you look both ways. But some safety lessons had to evolve over time. For example, no one wore seat ... »

Secure Sense Achieves Blackberry Authorized Reseller Status

On December 13th, 2016 Secure Sense has achieved the Blackberry Authorized Reseller Status. This tier recognizes Partners that have invested in the acquisition of a solid sales knowledge of the BlackBerry Enterprise Mobility Suites. We’ve identified the customer demand for ... »

What is Next-Generation Antivirus (NGAV)? via Carbon Black

In information security, the mere mention of the word “antivirus” elicits a largely unfavorable response. I’ve heard some descriptions from infosec pros that include: “not enough,” “ineffective,” and “archaic.” There’s merit to these claims. Antivirus has long been the most ... »

Ten Cyber Security Predictions for 2017 via BeyondTrust

In the cosmic wink of an eye, 2016 is almost done. So, it’s that time of year to invoke the dark arts of prediction and try to determine how the next year will unfold. For cyber security, predicting the future ... »

LogRhythm 7.2 Now Available For Download

LogRhythm’s platform has been purpose-built to power the next-generation Security Operations Center (SOC), and with the release of 7.2, is now further optimized to help you deliver the industry’s most efficient, effective end-to-end threat lifecycle management solution. Scalability: Reduce total ... »

Secure Sense Recognized on 2016 CRN Next-Gen 250 List

Secure Sense Recognized on 2016 CRN Next-Gen 250 List Annual List Features Trailblazing Solution Providers Transforming Business with Emerging Technologies Burlington, Ontario, November 7, 2016 – Secure Sense, Canada’s Fastest-Growing IT Company, announced today that CRN®, a brand of The ... »

Yesterday’s Technology & Cyber Risk Today: Time for a Security Assessment? via Bradford Networks

For most IT teams, addressing or thinking about cyber security is a daily concern. From updating AV software to creating security profiles, most IT professionals spend a portion of their day on tasks with a goal of securing their network. ... »

IoT Bots Cause Massive Internet Outage October 21st, 2016

The real perpetrator of the widespread Internet outage on Friday, October 21, 2016 is still not known but the weapon of choice was definitely IoT devices compromised with Mirai malware. The Distributed Denial of Service (DDoS) attack that started on ... »

Securing Enterprise Networks from Rapidly Increasing Malicious Attacks

Enterprise organizations are appealing targets for hackers. These networks can provide everything from valuable personal data profiles, to financial and research data – all valuable commodities on the dark web. The interest in targeted enterprise attacks has increased dramatically, with ... »

Taming the Great Disruptor: How Managing Change Can Bolster Your Security

Did you know China is having a hard time hiring hackers to meet the demand of vulnerable U.S. security systems? Okay, well… that might be a fictional story published by satirical newspaper The Onion. But it does highlight an important ... »

Fortinet Threat Landscape Report

Periodically, Fortinet publishes a set of findings based on threat intelligence gathered from hundreds of Cyber Threat Assessments performed across the globe. This report provides analysis and insight into the threats experienced within certain industry segments and regions. Published just ... »

PowerBroker Password Safe API is Available to Developers – for Free

Calling all vendors, end users, and application developers! BeyondTrust is now offering a free method to make all of your solutions more secure if you require a user or application to provide credentials for connectivity or authentication. BeyondTrust’s PowerBroker Password ... »

Is your network causing bottle-necks that hinder growth?

We recently read a thought-provoking article authored by one of our technology partners Fortinet, titled Network Security in the New Service Provider Reality. The article discusses how networks have to evolve and embrace the growing, dynamic distribution of data, as ... »

Can Bug Bounty Programs Halt the Rise of APTs?

Security researchers recently discovered a new, advanced form of malware that is so sophisticated, it is believed only a nation state could have developed it. Known as “Project Sauron”, the malware went undetected for five years until Kaspersky Labs discovered ... »

Consumers More Concerned with Financial Data Getting Hacked than Private Information about Their Families Being Exposed

Survey also reveals consumers more likely to hear about data breaches from the news or social media — not from companies holding their data. Centrify, the leader in securing enterprise identities against cyberthreats, today released findings from its 2016 Consumer Trust ... »

“Not If, but When” – Reflections on the OPM Breach

In my previous lives as a special agent in the FBI and also as the CSO of major U.S. corporations, I had to undergo periodic background investigations, usually every five years. I hold government clearances, and it was simply one ... »

6 ways Sophos Home can keep your kids safe this school year!

In many parts of the world right now we are right in the middle of back-to-school season. Kids are getting excited to see their friends again and head back to the classroom, and are preparing for the best possible experience ... »

Phishing Attacks – Overcoming Bad User Behavior

This is gold! Big thanks to BeyondTrust for articulating phishing attacks, and how often and easy they occur! No, no we are not talking about a wild attack between a fish and a man on a boat, we’re talking malicious ... »

Overlay Malware Revealed on Google AdSense

Sipping on your first-morning coffee, and checking the news on your Android, seems pretty harmless right? Wrong. The latest strand of malware can hit any site that uses Google AdSense … and unfortunately that’s a lot of them. The malware ... »

Product Overview: CylancePROTECT

Predict. Prevent. PROTECT. Stop merely detecting attacks. Prevent them using CylancePROTECT, the only enterprise endpoint solution that blocks threats in real time BEFORE they ever cause harm. “The fundamental flaw in today’s cyber security infrastructure is that detection happens BEFORE prevention. ... »

Presenting a Cylance Unbelievable Tour: Toronto 2016!

 They say, “Seeing is believing.” And, that’s never been truer for those information security professionals who have attended a Cylance’s coast-to-coast “Unbelievable Demo Tour”. The good news if you have never been? We’ve added a stop in Toronto, for the ... »

SysAdmin Day!

Today July 29, 2016, is the 17th Annual System Administrator Appreciation Day! So we wanted to show our appreciation for all the SysAdmins out there who day in and day out work to keep our systems safe. Secure Sense Partner ... »

Five Steps to Defend Against Ransomware via LogRhythm

Over the past three years, ransomware has jumped into the spotlight of the cyberthreat landscape. Until recently, most ransomware attacks were simply opportunistic and mostly affected individual users’ or small businesses’ computers. The ransom demands have commonly been the equivalent ... »

With KeRanger, Mac Users Are No Longer Immune to Ransomware Threats via Varonis

Cybercriminals who previously targeted Windows operating systems with ransomware have expanded their customer base to include the Mac OS. Known as KeRanger, it’s the first ransomware variant detected that infects Mac users. Unlike the usual methods of entry, such as ... »

Security Trends: Managed Security Service Providers via Fortinet

Maintain your organization’s integrity, and reduce the risk across all platforms with a Secure Sense Managed Service. At Secure Sense, the safety of your data is the driving force behind providing innovative and efficient protection practices that will never compromise ... »

Is Vulnerability Management Still a “B” Horror Movie? via BeyondTrust

Here we are in 2016, and the state of information security (specifically the lack thereof) feels more like a bad Toxic Avenger sequel than a box office blockbuster. We’ve had major breaches, huge failures,  significant doubt, speculation about new technologies ... »

Is your virtualized environment at risk for a data breach?

You know a concept is solid when it grows from a good idea to a standard business practice. It can feel like the change takes place overnight, especially if the solution can quickly prove its ROI – a company adopts ... »

Camp Secure Sense 2016 – Recap

What a whirlwind week, Camp Secure Sense has come and gone and we could not have had a better group of individuals to have been there! First off, we would like to thank every single one of you, our amazing ... »

Vulnerability in GNU glibc Affecting Nutanix Products: February 2016

Advisory ID:        Nutanix-sa-003-glibc     CVE-2015-7547 Last Updated:     25 February 2016 Published:           25 February 2016 Version:               1.0 On February 16, 2016 and industry-wide critical vulnerability in the GNU ... »

FortiOS SSH Update

  On January 13, 2016 we reported about a FortiOS SSH exploit, and it looks like it has a larger scope than originally reported. After the original report, Fortinet further investigated their product line and discovered the same vulnerability on some ... »

‘Backdoor’ FortiOS Exploit!

FortiOS is an operating system that powers Fortinet’s firewall platform, FortiGate. On January 9, 2016, an exploit for an SSH backdoor in the FortiGate operating system was posted to the Full Disclosure mailing list. In a statement released by Fortinet ... »

How Do I Protect My Digital Assets?

A Guest Blog Post by Watchful Software. May 27, New York Times: Jawbone Accuses Fitbit of Stealing Information by Hiring Workers Away June 1, Credit Union Times: Email Data Breach Costs $1.3 Million September 23, Becker’s Health IT &CIO Review: Insider ... »

SecTor 2015 Recap

Every year SecTor brings together experts from around the world to share their latest research and techniques involving underground threats and corporate defences. The conference provides an unmatched opportunity for IT Professionals and Managers to connect with their peers and ... »

Sophos Guest Blog: Got encryption? Consider these 6 things to choose the right encryption solution

With the proliferation of data and the need to access it from anywhere at any time, encryption is rapidly emerging as the best place to start your data security strategy. Despite some common ideas about encryption that it is too ... »

Guest Blog Post: Centrify ‘Fundamental Security Controls Most Overlooked’

When we take a look at the security industry as a whole there is a focus on all the various APTs and Zero Day-sorts of unknown attacks. However with the rush to fight the good fight; the basics of authentication, ... »

iPhone iOS Threat: Ins0mnia Never Sleeps

FireEye researchers discovered a vulnerability (ins0mnia) in iPhone iOS allowing potentially malicious applications to run continuously in the background, even after it appears that the user has closed them. This vulnerability, critically affects non-jailbroken iOS devices: malicious software designed to ... »

Camp Secure Sense – Thank You!

First we would like to truly thank each and every one of you for attending Camp Secure Sense! We hope that you found the conference informative and worthwhile of your time. We understand the difficulty of taking time from your work ... »

FireMon Makes NGFW Policy Migration, Optimization, and Management Light Work

Secure Sense Partner FireMon recently announced its new Security Manager. With Security Manager 8.0 a host of capabilities can be utilized to maximize the efficiency of your environment’s device policy security posture, and to gain both a holistic and a ... »

FireEye Awarded First Ever SAFETY Act certification for Cybersecurity

On April 29th, Secure Sense partner FireEye became the first ever cybersecurity company to be awarded the SAFETY Act certificate by the US Department of Homeland Security. This certificate provides the company’s customers protection from lawsuit or litigation in not preventing acts ... »

Tripwire Gold Status Partner

Secure Sense is happy to announce our recent move to a Gold Status Partner with Tripwire. Currently, we are the only Gold level Canadian Tripwire reseller in all of Canada. Tripwire has played an integral role in our Security profile ... »

Secure Sense Threat Map Powered by Fortinet

Secure Sense has now teamed up with its partner Fortinet to provide a threat map—now available on our new website. The Threat Map shows real-time traffic of cyber-attacks on a global scale, using input from over 2 million FortiGate devices ... »

The FortiGate Cookbook

Looking for better productivity and reduced risk with your FortiGate but unsure where to look for help? One of our major partners Fortinet has released a unique FortiGate Cookbook to assist you. The Cookbook provides users with examples and ‘recipes’ ... »