Alpine Cyber Blog

Put It In the Cloud. It’s Safer There.

By Cloud Computing, Cybersecurity

Times Have Changed – For the Better It wasn’t long ago – maybe 10 years – that the headline of this article would have blown my mind.  And I’d probably have dismissed this whole blog post as ridiculous propaganda.  But times have changed. If you’re still a cloud naysayer, even after all this time, I don’t expect this little post to fully change your mind.  But maybe it can put a chip in your preconceptions. And I’m not going deep here.  If you want to talk more, question my assumptions, or even rage from your rooftop, please feel free to…

Read More

3 Steps to Professional Vulnerability Management

By Cybersecurity

The IT Department Dream Scenario Imagine your CIO has the following information at his or her fingertips: Exactly how many machines are in their environment All the vulnerabilities for each device All the available patches A list of priorities to show which issues are most critical And what else could complete this dream scenario? For any patch that isn’t available or installable, the team has a mitigation plan to address it. Are you already living the dream? Or did you just realize your vulnerability management isn’t up to snuff? Keep reading and we’ll explain how CIOs can sleep easier at…

Read More

How The Grinch Stole… Your Information – Part 1

By Cybersecurity

We’ll start out by stating the obvious: Thieves stink. Nobody likes to get robbed. More so, nobody likes to admit that they didn’t prevent thieves from entering their house and taking their stuff. So generally speaking, it is always a good idea to lock your house’s windows and doors. Apply that same mindset to your home network. When most people think of their network, they focus on their laptop and desktop computers. But in this day and age, networks are much broader! Your network is comprised of your computers, phones, home automation components, smart TVs, smart appliances, and more. Each of…

Read More

Cloud Misconceptions: My data center is more secure than the cloud

By Cloud Computing One Comment

Thanks to marketers, salespeople, and old school big-iron IT grognards, the term “Cloud Computing” has become as amorphous as its puffy, shapeshifting namesake.  Movies, commercials, scandals, and phone features have thrown the term around to the point where it has become very difficult for the average IT professional to define.  Cloud has hit a point in its hype cycle where people understand just enough to be dangerous — and this lack of knowledge tends to lead to misconception and oversimplification of an otherwise deeply stratified and diverse set of technologies. In this blog post, I aim to debunk for the Cloud Noobs out there…

Read More

Don’t Fall Victim to a Phishing Attack

By Cybersecurity

Phishing is a form of attack that often uses email to get access to your company’s data. The emails are designed to get the victim to feel compelled to take action so that they will hand over sensitive information or download malware to give the attacker access to all sorts of data, records, and more. There are a few precautions you can take to avoid such attacks.

Read More