banner-why-daymark.jpg

Information Technology Navigator

Tips, Advice & Insights from Technology Pros

US-EU Privacy Shield Perforated - GDPR after Schrems II

On July 16, 2020, the European Court of Justice (ECJ – the EU’s high court) invalidated the EU-US Privacy Shield Framework as a potential mechanism for meeting the GDPR's cross-border personal data transfer restrictions.

Effective immediately, U.S. companies that process EU “personal data” can no longer rely on registration under the Privacy Shield and must establish an alternative legal basis for any continued EU-US transfers.

Previously, cross-border transfers to the US were permitted under three mechanisms: 1) the Privacy Shield (http://privacyshield.gov), 2) Standard Contractual Clauses (SCC), and 3) Binding Corporate Rules (BCR).

Read More
Tue, Aug 18, 2020
Share:   

Conditional Access – Deployment Best Practices

Conditional Access in Azure AD provides a level of security required to maintain appropriate controls over who can access confidential and privileged information. It was the topic of discussion at our most recent “Ask the Engineer Q&A Roundtable” where attendees learned tips for a successful Conditional Access deployment and got answers to their specific questions.

Read More
Mon, Jun 15, 2020
Share:   

State-Backed Hackers Targeting All Exchange Servers

On February 11 2020, Microsoft released a patch for Exchange Servers that would fix a vulnerability pertaining to unauthorized access to the backend of the Exchange Control Panel. There is now confirmation from a source at the United States Department of Defense that multiple nation-state backed actors and other ransomware gangs are actively and maliciously exploiting this vulnerability on unpatched systems. The vulnerability results from the Exchange Server failing to properly create unique cryptographic keys at the time of installation. The hackers’ sophisticated exploits circumvent encryption, granting them full access of the server.

It is imperative that the latest patches from February 11th be applied as even a single Exchange instance puts you at risk.

Read More
Tue, Mar 10, 2020
Share:   

4 Crucial Tips for Maintaining a Web Application Firewall for Retail

 

Retailers are under intense competition to deliver personal, seamless and differentiated on-line shopping experiences to ensure customer loyalty and drive growth. And while a retailer’s website must be extremely responsive and meet high user expectations, it must also be highly secure.

A cloud-based web application firewall (WAF) provides e-commerce sites with a level of data protection that eliminates website vulnerabilities, blocking bad actors and harmful traffic without degradation of the site’s performance.

Here are 4 crucial tips for retailers who have implemented a WAF

Read More
Thu, Sep 12, 2019
Share:   

Takeaways from Cisco Live!™ 2018

I recently returned from this year’s Cisco Live! in Orlando. It was a busy week jam packed with great speakers, engaging sessions, demos and product announcements. There was so much going on at any given moment it was hard to get to every session of interest. Now that I’m back I’ve had some time to digest all I learned and thought I would share my key product takeaways for network security.

Read More
Tue, Jun 26, 2018
Share:   

Reboot Your Router Now! The Latest on VPNFilter

Do you have a Small Office Home Office (SOHO) grade router at home? Is it possible you have rogue devices on your corporate network? Does Supervisory Control and Data Acquisition (SCADA) traffic traverse your network? If you answer yes to any of these questions, then this post is a must read!

Read More
Wed, Jun 06, 2018
Share:   

Optimizing Firewall High Availability in Azure

 

Firewall capabilities fall short in cloud environments like Microsoft Azure due to the fact that Azure and other major public cloud providers offer limited access to their API’s. This creates a problem for enterprises as they look to security independent software vendors (ISVs) to enhance their security capabilities in the cloud the same way they would in the data center.

Read More
Tue, May 22, 2018
Share:   

Pending Initial Public Offering (IPO) Puts Security in the Spotlight

Becoming a publicly traded company has a profound impact on the way a business operates. The technology that is in place, and how it is deployed, can also come under close scrutiny. That was certainly the case for one of Daymark’s life science clients whose pending IPO put a spotlight on network security and data protection. In this blog, Steve Caprio, Daymark Cloud Consultant, answers some questions on the security journey of this enterprise.

Read More
Thu, Apr 26, 2018
Share:   

Pharmaceutical Company Upgrades Network to Meraki

Daymark consultants are on the front lines every day listening to our customers’ pain points and then architecting and deploying solutions to help solve some of their toughest IT challenges. They have amassed a wealth of knowledge from these real-world experiences and are happy to share them. Today we sat down with Matthew Mansell, Senior Network Consultant at Daymark, to talk about a recent networking project at a pharmaceutical company with 400 employees and a multi-building campus.

Read More
Tue, Mar 20, 2018
Share:   

Don’t Click that Link! Why Phishing Continues to Work

Cybercriminals continue to use phishing attacks on individuals within enterprises. With increased sophistication and multiple attack vectors, businesses must be vigilant at every step of the way to prevent infiltration. Let me share a recent example-

Today I received an email from a recruiter. It’s not out of the ordinary for recruiters to ping us with resumes hoping that we will see a fit for their candidate. This one was well written, had a company logo, and a picture of the sender. Including pictures is a growing trend with recruiters

Read More
Thu, Jul 06, 2017
Share: