network security

Lawsuit Alleges Sony Failed to Protect its Computer Systems Against Hackers

Sony continues to feel the pain of the recent hack in which employees’ “most sensitive data, including over 47,000 Social Security numbers, employment files including salaries, medical information, and anything else that their employer Sony touched, has been leaked to the public, and may even be in the hands of criminals,” according to a lawsuit…

Learn More

10 Fundamental Tasks for SMB Firewalls

Your firewall is the core of your SMBs’ security infrastructure. As an access control point for all network traffic a firewall empowers your IT team to safely enable applications and access to the  benefit of the organization. In order to safely enable applications and technology on your network, your IT team needs to put in…

Learn More

Understanding Businesses’ Biggest Security Threats

In a world where a week rarely goes by without reports of at least one serious cyber attack against a major organization, it’s important to ask a few key questions: •     What’s happening across the threat landscape? •     What kinds of  attacks are being launched? •     How can my business protect itself?…

Learn More

Defense in Depth with Managed Security Services

As organizations face tighter requirements around privacy and compliance, they also face a mounting challenge in countering advanced security threats. The accuracy of identifying threats becomes essential as security teams migrate from legacy approaches to a security intelligence model. To address these cyber security challenges, businesses must fundamentally change how they think about security. Updating…

Learn More

New York Times Falls Victim to Hacker Attack

The websites of the New York Times and Twitter were targeted by hackers on Tuesday afternoon, August 27. On Wednesday, the New York Times site was still suffering problems related to the DNS attack. The popular newspaper and social network’s domain name details were maliciously edited by the Syrian Electronic Army (SEA), who claimed responsibility…

Learn More

NAC Security in a BYOD Environment

Network access control (NAC) is a solution whose time has come. The popularity of BYOD and business-critical SaaS apps, makes NAC a critical infrastructure component. NAC bolsters the security of a proprietary network by restricting the availability of network resources to endpoint devices that comply with a defined security policy. NAC restricts the data that…

Learn More

Ensure Network Security with Penetration Testing

The security of your network should should be a top priority and it demands your attention. Security breaches and related interruptions in the performance of services or applications can result in significant threats to your organization in the form of lost revenue and critical proprietary information. As big data grows exponentially, businesses face the ever-changing…

Learn More

Essentials of Network Security: Part Two

This is part two of a two-part series on the basics of network security. Read part one here. One of the big challenges of network security it the ever-changing nature of the threats. Knowing what to protect and how to protect it takes a comprehensive approach to security management. Plugging holes as they appear is…

Learn More

Essentials of Network Security: Part One

Security breaches are on the rise. As the complexity of the threats rise, so do the security measures required for network protection. Securing your business’ infrastructure demands a comprehensive approach and a firm grasp of network vulnerabilities and protective measures. Though, more than likely, you trust your business’ data and network security to an expert…

Learn More

Security Considerations for Upgrading Exchange Server

If your business’ resources are limited and you are content with Exchange 2003 or 2007, you may see no reason to upgrade to the latest version of Microsoft Exchange Server. However, by prolonging your deployment, you are likely missing out on new capabilities that could benefit your business, including major security, compliance and productivity enhancements.…

Learn More

Get More Information

Use the form below to get more information about ACE IT Services and what we can do for you.

  • This field is for validation purposes and should be left unchanged.

Contact ACE IT Solutions for more details on our data storage, backup and disaster recovery solutions.

Call (646) 558-5575
Or Request More Information

  • This field is for validation purposes and should be left unchanged.