Blog

NH Learning Solutions Blog

How to Improve Security within Your VMware Environment

How to Improve Security within Your VMware Environment

Guest Author: Ryan Birk, Technical Instructor

Cybersecurity is at the forefront of everyone’s mind right now. However, there can be a lot of confusion when it comes to those with virtual servers: How can businesses be sure their data will be safe? Should more precautions be taken because these are virtual machines? The answers may surprise you.

6 Cybersecurity Precautions Companies Fail to Take

6 Cybersecurity Precautions Companies Fail to Take

Guest Author: Shawn Stugart, Technical Instructor

The September 2017 Equifax breach is shaping up not only to be one of the largest in history (143 million private records exposed, or about 44 percent of US adults) but also the most potentially damaging since the data includes names, birth dates, Social Security numbers, and, in some cases, driver’s license and credit card numbers. In combination, this personally identifiable information could be used by identity thieves to open new lines of credit, apply for loans, file fraudulent tax returns, and more.

The NIST Cybersecurity Framework & Workforce Development

The NIST Cybersecurity Framework & Workforce Development

In May of 2017, President Trump issued an Executive Order for “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure,” which hold heads of executive departments and agencies (agency heads) accountable for managing cybersecurity risk to their enterprises.

How to Help Secure Windows Server

How to Help Secure Windows Server

As more IT infrastructures become virtualized and migrate to public, private and hybrid cloud environments, cybersecurity has been a persistent concern. Taking assets off premises and entrusting them to third-party service providers always carries at least some degree of risk; the hardware and software that were once under your direct supervision are now someone else's responsibility. Although they are usually in good and experienced hands, you have to remain vigilant against the various possible cyberattacks against your critical servers, storage, networks and applications.

Top 7 Data Breaches of 2017

Top 7 Data Breaches of 2017

According to the 2017 Ponemon Cost of Data Breach Study, the global average cost of a data breach is $3.62 million. A data breach is the intentional or unintentional release of secure or confidential information to an untrusted environment. Other terms for data breach include: unintentional information disclosure, data leak, and data spill.

As threats continue to rise and evolve, understanding and managing cybersecurity risks have become top-of-mind for business and government leaders. Organizations across the world are adopting innovative technologies like cloud-enabled cybersecurity, big data analytics, and advanced authentication to reduce cyber-risks and improve cybersecurity programs. However, data breaches are harsh realities, especially to organizations that are left vulnerable.

8 Cybersecurity Webinars this October from New Horizons

8 Cybersecurity Webinars this October from New Horizons

October is National Cyber Security Awareness Month (NCSAM), which is an annual campaign to raise awareness about the importance of cybersecurity. NCSAM aims to engage and educate public and private sector partners through events and initiatives, while providing tools and resources needed to stay safe online, and increase the resiliency of the Nation in the event of a cyber incident.

Here are several must-attend cybersecurity webinars taking place this October at New Horizons. Remember: All of our webinars are free, and if you cannot attend on the live date, once registered, you will automatically be emailed a link to the webinar recording after the webinar runs. See descriptions and registration links below:

Top 5 Cybersecurity Certifications to Help Protect Your Business

Top 5 Cybersecurity Certifications to Help Protect Your Business

How important is security in your business? If the answer is anything less than ‘extremely’, you could be faced with some very serious problems. The threat of hacking is at an all-time high and many companies are defenseless against attack. Some may think they are protected but can still be very susceptible to unwanted access by hackers. The threat of hacking is so great because of a hacker’s ability to customize the attacks based on the particular software, firewalls, etc. that they are going against.

How to Help Prevent a Data Breach

How to Help Prevent a Data Breach

According to the 2016 Global State of Information Security Survey, in 2015, there were 38% more security incidents detected than there were in 2014. As threats continue to mount, understanding and managing cybersecurity risks have become top of mind for business and government leaders. Organizations across the globe are responding by taking action. Increasingly, they are adopting innovative technologies like cloud-enabled cybersecurity, Big Data analytics and advanced authentication to reduce cyber-risks and improve cybersecurity programs.

What is a Computer Hacking Forensic Investigator?

What is a Computer Hacking Forensic Investigator?

Computer Investigation techniques are being used by police, government, and corporate entities globally, and many of them turn to EC-Council for the Computer Hacking Forensic Investigator CHFI Certification Program. Computer Security and Computer investigations are changing terms. More tools are invented daily for conducting Computer Investigations, be it computer crime, digital forensics, computer investigations, or even standard computer data recovery,

The tools and techniques covered in EC-Council’s CHFI program will prepare individuals to conduct computer investigations using groundbreaking digital forensics technologies.

Top Security Features of Windows Server 2016

Top Security Features of Windows Server 2016

Securing Microsoft Windows Server has become a more important task this decade as the complexity of the typical IT environment increases. Most important technical infrastructures were once housed on-premises and directly overseen by the IT department; but now, these assets may be situated in a public, private, or hybrid cloud, or in a colocation facility.