Cyber Security Plan: I know I need one, but where do I start?

Hackers, Ransomware, Regulations, and Compliance. Executives across the US find these terms creeping into their daily reading. Question is, when will they have real impact for you and your business? You know you need to start taking cyber security seriously, but it feels like one more money pit for IT. Worst yet, none of your…

Read More

What Do You Mean My Email Isn’t ENCRYPTED?

Encrypting traffic to your website is an industry standard, but what about protecting your other business communications? Should your email be encrypted too? Here at Roka Security, we think it should be, but there’s a little more to it than telling your IT person, “Make sure our email is encrypted.” Below we discuss the different…

Read More

NIST 800-171 – Why, What is it, and Where to Get Started

Earlier in 2017 DOD contractors learned about the new DFARS clause 252.204.7012. It required that existing contractors, and in many cases subcontractors, be NIST 800-171 compliant before December 31, 2017. Many have missed that deadline, or new contractors are searching for help with this new requirement. I wrote this article to give you the breakdown…

Read More

Need help with NIST 800-171 compliance?

Have you been told your business needs to NIST 800-171 compliance by a customer or the government? You’re not alone. Businesses all over the US are finding themselves with a new security requirement they know little about. The good news is, it’s probably not as bad as you think. Who Needs NIST 800-171 Compliance? Any…

Read More

IDS vs IPS : What’s the difference?

By now you’ve heard experts tell you to install an IDS/IPS solution in your network. However, they never give you a good IDS vs IPS comparison. Implementing an IDS or IPS can dramatically increase your network’s security profile. The question is, which one is right for your organization? What’s the difference between IDS and IPS…

Read More

5 ways to protect your enterprise network against ransomware

I think most of us will agree: Ransomware is one of the largest security threats to your enterprise network. Even with ransomware evolving, there are steps you can take to prevent it from encrypting files and spreading through your network. In today’s article we will walk through 5 ways to combat ransomware: Browser based Crytpo…

Read More

Pen Test: What You Need to Know Before Starting

You need a Penetration Test or “Pen Test!” You’ve heard you need one for compliance, or someone just thinks it’s a good idea. Where do you start? Should you hire a firm or try it with your current staff, and what do you actually need out of a Pen Test? Is your network secure and…

Read More

Vulnerability Assessment : What You Need To Know

The term Vulnerability Assessment is often thrown around for a variety of cyber security procedures. While it is an industry term that encompasses a large area, it’s less complicated than most “experts” make it. Today, we’ll walk through what you need to know about Vulnerability Assessments to get started and answer these questions: What is…

Read More