The Most Recent Data Breaches and Their Consequences

Big data breaches have been making headlines more and more frequently. It was announced last week that the computer systems at the U.S. Office of Personnel Management had been breached. This is the second computer break-in in the past year for the agency. An estimated four million current and former federal employee records may have been compromised.

Moving to the Cloud: The Advantages

According to the International Data Corporation (IDC), total public IT Cloud services (SaaS, PaaS, and IaaS) spending will reach $127 billion in 2018. Compared to the 4.1% compound annual growth rate the IT market will experience from 2013-2018, the public Cloud will grow at a 22.8% compound annual growth rate. That’s five and a half times more than the total IT market spending!

Protect Your Organization from Ransomware

It’s a moment every business owner dreads. A message appears on your organization’s computer screen alerting you that your files have been encrypted and the only way to access them is by paying a ransom. Security threats to computers and mobile phones have grown more sophisticated around the globe in the past few years.

Demystifying IT Security and Measurably Quantify Risk

From deep within the Secured Network Operation Center, thousands of software vulnerabilities are constantly monitored, investigated and vigorously blocked at the US ProTech, center of security intelligence. US ProTech asks “so, what’s really at risk in cybersecurity?”

The Cloud: The 3rd Platform of Computing

Around 2008, the IT industry started to experience a massive shift in traditional computing. The International Data Corporation (IDC) began referring to this change as the “3rd platform.” The 3rd platform is built on the four technology pillars for innovation and growth: Cloud, mobile, big data, and social technologies.

Beware of Cryptolocker

Imagine you are on your personal or work computer, and you receive a seemingly innocuous email from a trusted source, such as your bank, your tax office, or even a friend. The source asks you to download a file to update important account information. But, when you click on it, your most important files become encrypted and you are threatened you will lose them unless you pay a sizable sum to get them back!

FCC Approves Net Neutrality Rules

After a landmark vote on February 26, The Federal Communications Commission officially classified Internet providers as public utilities. The new net neutrality rules were approved 3 to 2 among party lines. The rules ban high-speed Internet providers, such as Verizon, AT&T, and Time Warner Cable, from blocking websites, slowing down content from particular sites, or selling-off faster traffic speeds to the highest bidders.

Bandwidth Bottleneck Coming to an End?

It is predicted that that by 2017, there will be around 268 billion app downloads. The average person already uses 26 different apps per month. This growth is clearly driven by the younger work force, who use their mobile devices and tablets for both work and play.

China vs. USA / Nation-State Sponsored Attacks

Deep within the Secured Network Operation Center (SNOC), thousands of software and network vulnerabilities are constantly monitored, investigated and vigorously blocked at the US ProTech center of security intelligence. “APT’s, or Advanced Persistent Threat, ( are clearly on the Rise,” says Goetsch, the CEO of US ProTech, Inc., head of an elite group of expert security technicians specialized in offensive-side penetration testing for nearly two decades. In late November, 2014, a Chinese advanced persistent threat (APT) compromised to set up a watering hole style web-based drive-by attack against US Defense and Financial Services firms. The attack was executed against specific targets by compromising the Thought of the Day (ToTD) Adobe Flash widget that appears initially whenever anyone visits any page or article. The attack involved a unicorn among cyber threats: chained 0-days of Adobe Flash and Internet Explorer vulnerabilities. US ProTech and it’s Malware partner Invincea uniquely detected and stopped the attack that evaded all other network defenses. You are invited to read a research report published about this attack. The report includes: Information on the types of business sectors and groups targeted Details on the group that  iSIGHT has attributed to these attacks Screenshots of logs detailing the chain of events that occur when such attacks take place Click here Call USPROTECH today for all your security...