Is Your Data Safe? Find Out with SRVA by Archetype SC

A weekend full of data breach announcements showed the wide-ranging impact of cyber criminals across industries, as major brands like Marriott, Dunkin Donuts, and the United States Postal Service announced attacks that impacted hundreds of millions of customers in total. The largest of the breaches, Marriott’s Starwood properties, affected more than 500 million guests, with […]

Archetype SC Engineers Attending CyberArk Impact 2018

Three Archetype SC security engineers will take in CyberArk Impact 2018 at the Seaport Boston Hotel & World Trade Center in Boston. The three-day conference allows Archetype SC’s team to gain valuable training from key players in the security space, along with networking, labs, and educational seminars. Speakers at CyberArk Impact 2018 include CyberArk Founder, Chairman, […]

Archetype SC Acts as Consultant for Client’s CyberArk Needs

Archetype SC has executed a contract with a client to provide CyberArk expertise in a consulting role. The client’s IT staff sought out Archetype SC’s expertise with CyberArk, contacting Archetype SC team members for consultations with an ongoing project. Due to the volume of consulting requests, Archetype SC and the client signed a contract to […]

Half-Day Conference Packs in SOC Knowledge for Archetype SC Engineers

 Two of Archetype SC’s security engineers advanced their learning at the SANS Institute’s Security Operations Center (SOC) Solutions Brief in Boston on Nov. 17. The engineers learned from Chris Crowley, SANS Principal Instructor and SOC Course Author, who presented a lecture on SOC Use Case Development. His message centered on using the SOC effectively, by ensuring […]

Archetype SC to Attend Boston Cyber Security Summit

Five security engineers from Archetype SC will be in attendance at the Boston Cyber Security Summit on Wednesday, Nov. 8. Plixer is the title sponsor of the one-day conference, which allows cybersecurity focused professionals to learn, evaluate, and see demonstrations of new technologies and techniques in the field. The Boston Cyber Security Summit will feature discussions on […]

Trick or Treat: 5 Cybersecurity Tips For Halloween

As National Cybersecurity Awareness Month ends on Halloween, it presents the perfect time to remember some safety tips to keep the monsters, zombies, and mummies away from your network. According to the 2017 Ponemon Cost of Data Breach Study, sponsored by IBM, the global average cost of a breach is $3.62 million, with more than […]

Top 8 Cyber Security Questions for Small Businesses

Hackers are targeting small businesses more than ever before, while 87% of business owners feel they are not at risk of attack. According to a survey by Manta, only 69% of small business owners have security measures in place to prevent attacks, with the most common being antivirus software. For small business owners, a cyber attack […]

Archetype SC to Attend D.C. Metro Cyber Security Summit

An Archetype SC security engineer will be in attendance at the D.C. Metro Cyber Security Summit on Thursday, June 29. The conference, title sponsored by Cybraics, brings together security experts and solution providers with corporate executives tasked to protect their companies’ infrastructure. On the agenda for the 2017 D.C. Metro Cyber Security Summit are roundtable discussions, interactive […]

‘WannaCry’ attack highlights ransomware

An unprecedented cyber-attack took the world by storm over the weekend, affecting more than 200,000 systems in 150 countries by targeting unsupported and unpatched versions of Microsoft Windows operating systems. The attack, known as WannaCry, came in the form of a ransomware virus, which takes control of a computer and locks files. To unlock your […]

Securing Your Windows Infrastructure – Encryption and Active Directory

Welcome to the latest installment of “Securing Your Windows Infrastructure”. Today’s topic is encryption – specifically encryption as it pertains to Active Directory. As with other applications, data managed by AD can be encrypted in storage and in transit. Let’s take a quick look at where encryption is, and can be, used by AD. Replication […]