US Canada China
Search
Back 

Events

Tuesday, January 9, 2018

9

Jan

2018

Meltdown and Spectre Side-Channel Advisement

Meltdown and Spectre Side-Channel Advisement

– The Bottom Line
There have been so many articles, advisories, blogs and opinions shared regarding the Meltdown and Spectre Side-Channel vulnerability, it’s difficult to tell fact from FUD. All these data points may still leave you asking: How does all this affect me, my business and my clouds?

Bottom line up front: know what your computer systems are running and quickly apply the recommended patches to each of the vulnerable platforms. Don’t take this lightly, it’s a very serious situation, however exploiting this vulnerability is not easy nor is there a known instance of an exploit in the wild. If you are unsure if you are affected, TIG can help.

Why Look To TIG?
As a leading technology solution provider, TIG has long standing relationships with most of the top tier vendors that manufacturer the equipment that is subject to this published Meltdown and Spectre Side-Channel vulnerability. This relationship provides TIG with an inside track on present and future impact, exposure and recommendations on how to mitigate the risk of this wide-spread vulnerability. TIG is offering a Meltdown/Spectre assessment services which catalogs your organizations assets and assesses the possible points of exposure and makes specific recommendations to minimize risk to your infrastructure.

Number of views (217)
Read more

Categories: TIG Blog

Tags:

12/28/2017 3:30 PM - 5:30 PM

28

Dec

2017

Holiday Bowl 2017

Author: Event Admin

Date of Event: Thursday, December 28, 2017
Where: SDCCU Stadium
9449 Friars Rd.
San Diego, CA 92108
Time: Tailgate: 3:30pm – 5:30pm
Kickoff: 6:00pm

In appreciation of your patronage, TIG is inviting you to the 2017 Holiday Bowl Game between Michigan State and Washington State! Don’t miss out on our pregame party where you can check out the latest software and hardware technology while enjoying great food, drinks, and raffle drawings!

Limited tickets available. Contact your TIG Account Executive for details!

Number of views (343)

Thursday, December 14, 2017

14

Dec

2017

What’s Your Data Worth?

Have you ever wondered what your data is worth on the dark web? Recently, RSA went undercover in the dark web to find out just how pervasive “dump” selling was and what your information is worth.

RSA and Fox Business News Report found the following:

Social

  • Instant Messaging ($1-$5)
  • Emails ($1-$3)
  • Dating Sites ($1-$10)
  • Social Media Websites ($3)

Finance

  • Financial Services ($7-$10.50)
  • Online Money Transfer Services ($0.0-$15.50)
  • Bank Accounts ($3-$24)
  • Credit Card Websites ($3-$5)
  • Accounts from Recent Breach ($1)

Travel/Leisure

  • Airlines ($3-$10.50)
  • Hospitality Services ($0.7-$1.50)

The scariest part of these findings is that dating accounts have quickly become the third & fourth most valuable type of account to resell on the dark web. The reason? It provides the attacker with enhanced knowledge giving them the ability to generate a ‘Synthetic’ Identity. They glean intimate personal details about your life to create a new physical and virtual you in order gain credit, buy property, and obtain enough knowledge to take over your existing accounts by answering deeper security questions such as, “What was your first car?”, “What’s your dad’s middle name?”, or “Who was your favorite teacher in high school?”

So why do businesses & organizations care about this new trend?

Many organizations deploy technologies that are based on the same “Personal Question” methodology. An attacker who knows the answers to these questions can gain access to password reset mechanisms. Likewise, employees often use similar passwords across work and personal sites. More cases are being seen involving blackmail and corporate espionage – when people feel subject to embarrassment or criticism over information they posted on a dating site or social media outlet, they are more susceptible to do unnatural things to keep that information private.

How are you protecting not only your networks and Intellectual Property, but how are you educating your users and protecting them?

Be Vigilant, Stay Aware!

Christian Rolland, BVP, CCDP, CCNP+S, CCNP+R&S
Sr. Practice Director, Enterprise Networking

Number of views (434)
Read more

Categories: TIG Blog

Tags:

10/11/2017

11

Oct

2017

ISSA Discover Security Conference 2017

Author: Event Admin

Date of Event: 10/11/2017
Where: Pomaika’i Ballrooms at Dole Cannery
735 Iwilei Rd
Honolulu, HI 96817
Time: All Day

See What Matters! Malicious attackers are penetrating networks every day, compromising what most organizations think is adequate security. They can run, but they cannot hide. With the most advanced security solutions, attackers and hackers armed with weapons-grade cyber exploits and malware and those with malicious intent get inside infrastructures, DNS gateways, and multitier applications that are on premises or in the cloud; we cannot let our guard down. Discover what other people are doing to improve their security posture and what vendors are doing to help them. Discover the latest security trends, what can possibly happen inside your environment and how vendor solutions can help you See What Matters so you can see, manage and secure what matters.

Hosted by the Hawaii Chapter of Information Systems Security Association (ISSA), this 2-day event is focused upon cybersecurity for all vertical market segments in both the public and private sectors. It is will attended, and recently moved to a larger venue that can accommodate up to 600 attendees.

Number of views (921)

10/10/2017 5:00 PM - 8:30 PM

10

Oct

2017

CIO/CISO Cybersecurity Dinner Honolulu

Author: Event Admin

Date of Event: 10/10/2017
Where: Ruth’s Chris Steakhouse
500 Ala Moana Blvd.
Honolulu, HI 96813
Time: 5:00 PM - 8:30 PM HST

Your organization gets hit with ransomware and the IT guys are there to fix it. But what does that mean? Join TIG at Ruth’s Chris Steakhouse and learn what to consider if you get hit or have been hit by ransomware. Topics of discussion will include Compliance, Due Diligence, and Data Breach, with TIG’s Perry Jurancich (CyberSecurity Solutions Architect) speaking.

Number of views (735)
RSS
12345678910 Last

TIG is a single source IT solutions provider for businesses and organizations of all sizes.

TIG shares with its clients the strength of over 33 years of computer system integration experience and hundreds of long-term manufacturer alliances.


Quick Links

Copyright 2018 by Technology Integration Group