02 Feb
What is ITS Safe (TM) and why you should be considering it for your business.

Cyber Security conversation with Brad Stoller and Albert Whale

Many organizations are overwhelmed with today’s efforts to secure the organization.  Whether they are a small to mid-sized business, or a global organization.  Today in the US we are short more than 3.5 Million experienced Cyber Security professionals.

If we think of a Computer Virus as something similar to a virus that you can catch (like the flu), how effective are the tools you are using currently?  The typical organization using both Firewalls and Virus Scanners, has less than a 40% chance of discovering the infection.

The premise of the Virus Scanner is a reactive tool which is attempting to discover the initial infection, after the breach has already occurred.  These tools are used as a reactionary tool, and are less than 40% effective.  

The ITS SafeTM security appliance works differently, because we are reviewing the traffic BEFORE it reaches the end point destination.  That makes our ITS SafeTM appliance a differentiator, because we are being proactive, and stopping the malicious attacks before they reach your computing environment.

IT Security Solutions, Inc. is a cyber security organization which wants to improve and protect your organization with the latest tools and services for improving your organization’s security.  The first question we want to ask you, when was your last security assessment?  How often do you have an assessment performed?  Would you consider that Constant monitoring could benefit your organization?

Let’s start with a conversation today.  You can reach us at info@it-security-solutions.com or at 412-889-6870.

http://traffic.libsyn.com/ironcityriskavengers/ITS_Safe_Product_discussion..m4a

21 Jan
A positive change, with Albert Whale and Jim Loeffler – Episode 8

This is the second episode for 2019, and what we are focusing on today is focusing on the positive effects for your business.  Are you the Weakest link? How do the attackers are get past your Firewall and Virus Scanners.

Here are two reasons:

• Hackers have the same tools.

• They know how to evade them.

Using the Internet allows attackers to follow you inside the firewall.

Facebook

Redit

Yahoo

Hotmail

Gmail

Read More “A positive change, with Albert Whale and Jim Loeffler – Episode 8”
15 Jan
The pain of staying the same, is worse than the pain of change – Episode 7

Today we are discussing the concept of change.  The title of the episode is called: “The pain of staying the same is worse than the pain of change.”  Most organizations fail to recognize that change is a process that makes improvements to the organization, instead of ignoring the problems and continuing to do the same things over and over again.  There is pending legislation that wants to fine or Jail CEOs that fail to do enough to protect the organization, and the data that they are using.

The mission of the Risk Avengers podcast is to discuss current cyber security issues, procedures for protecting your business, as well as Compliance requirements for business owners. 

Our 10 minute format is designed to make it easy for listeners to get up to date on the current People, Processes and Problems for your Business.

The show is Hosted by Albert Whale, Founder & CEO of IT Security Solutions, and Jim Loeffler, President of InTune Business Advisors.

Join us to discover the road for improved security and protecting your business, be it small or global.

The information discussed on this podcast is presented for informational purposes only. It is not intended as nor does it constitute specific information security or accounting advice and should not be acted upon as such.

http://traffic.libsyn.com/ironcityriskavengers/The_Pain_of_the_same_exceeds_the_pain_of_change.m4a

23 Dec
Equifax Breach reported to be preventable – Episode 6

This could also be titled, making your Cyber Security program into a profit center.

Recorded on 12/17/2018.

Today we are reviewing the news about the recent Equifax breach.  The GAO and congressional hearing seem to indicate that there were three major misses in the implementation of cybersecurity, and if they were implemented correctly, would have prevented the breach.  When was your last assessment?  What were the metrics? How can your organization benefit from improved security efforts.  This and more on our 10 minute explore.

The mission of the Risk Avengers podcast is to discuss current cyber security issues, procedures for protecting your business, as well as Compliance requirements for business owners.

Our 10 minute format is designed to make it easy for listeners to get up to date on the current People, Processes and Problems for your Business.

The show is Hosted by Albert Whale, Founder & CEO of IT Security Solutions, and Jim Loeffler, President of InTune Business Advisors.

 

20 Nov
Penetration and Compliance Testing – Episode 2

This is the Iron City Risk Avengers – Episode 2.

This podcast is a 10 minute format with security information that you can digest easily.

There is much to discuss in the worlds of Penetration and Compliance Testing.  The first thing to take notice of is to start. Too many organizations fail to complete the testing, and wide up having a breach.  Many are not aware that a breach has occurred until it is too late.

The mission of the Risk Avengers podcast is to discuss current cyber security issues, procedures for protecting your business, as well as Compliance requirements for business owners.

Our 10 minute format is designed to make it easy for listeners to get up to date on the current People, Processes and Problems for your Business.

The show is Hosted by Albert Whale, Founder & CEO of IT Security Solutions (Albert.Whale@IT-Security-Solutions.com), and Jim Loeffler (jaloeffler@getintune.com), President of InTune Business Advisors.

Join us to discover the road for improved security and protecting your business, be it small or global.

 

The information discussed on this podcast is presented for informational purposes only. It is not intended as nor does it constitute specific information security or accounting advice and should not be acted upon as such.

Sidebar: