Secure Texting App or Secure Messaging App: Which should you use?
You need to protect your text messages and a secure texting app seems like the way to go. However, there’s a difference between secure texting apps and secure messaging apps. In this article, we’ll explain: Secure Texting Apps vs Secure Messaging Apps What Secure Texting should mean to you What mobile providers can collect even…Read More
Best Secure Messaging App: What’s the right choice for you?
Now that everyone agrees we need to protect even our messages, the next question is, which is the best secure messaging app to use? Which app you should use depends on what you care about, and why you need to protect your information. In this article, we compare the most popular secure messaging apps against…Read More
Cyber Security Threats for 2018 : What to Expect
Last year the top cyber security threats changed dramatically. And 2018 will be no different. Except we are going to see even craftier ways for hackers to make money off of you! Below we will predict and discuss the new threats you will encounter in 2018: Money vs Mayhem Browser based Crypto Currency Miners Ransomware…Read More
Intrusion Detection Software: Should I go Open Source, Appliance or Managed Service
You know you need Intrusion Detection Software (IDS) or Intrusion Prevention Software (IPS). The question is which IDS/IPS Solution is right for your Organization? You can use a “Free” open source tool, buy an expensive appliance, or just contract a managed service. How do you choose? Intrusion Detection Questions In this article, we provide a…Read More
Vulnerability Scan: But I Have Patch Management, Why Do I Need a Scan?
“I don’t need a vulnerability scan of our network, everything is patched. We have patch management!” Have you thought those words, even said them aloud? Too many cyber security terms are thrown around these days, their meaning confused and watered down. In this case, what you don’t know CAN hurt you. Patch Management Works, Where…Read More
Cyber Security Plan: I know I need one, but where do I start?
Hackers, Ransomware, Regulations, and Compliance. Executives across the US find these terms creeping into their daily reading. Question is, when will they have real impact for you and your business? You know you need to start taking cyber security seriously, but it feels like one more money pit for IT. Worst yet, none of your…Read More
What Do You Mean My Email Isn’t ENCRYPTED?
Encrypting traffic to your website is an industry standard, but what about protecting your other business communications? Should your email be encrypted too? Here at Roka Security, we think it should be, but there’s a little more to it than telling your IT person, “Make sure our email is encrypted.” Below we discuss the different…Read More
NIST 800-171 – Why, What is it, and Where to Get Started
Earlier in 2017 DOD contractors learned about the new DFARS clause 252.204.7012. It required that existing contractors, and in many cases subcontractors, be NIST 800-171 compliant before December 31, 2017. Many have missed that deadline, or new contractors are searching for help with this new requirement. I wrote this article to give you the breakdown…Read More
Need help with NIST 800-171 compliance?
Have you been told your business needs to NIST 800-171 compliance by a customer or the government? You’re not alone. Businesses all over the US are finding themselves with a new security requirement they know little about. The good news is, it’s probably not as bad as you think. Who Needs NIST 800-171 Compliance? Any…Read More