GDT Webinar Series – How to Fail at Security? Reserve Your Spot

You searched for :security

Dallas, TX, October 19, 2023 – Global IT solutions provider General Datatech (GDT) announced its recent partner designation from Fortinet, the global cybersecurity leader driving the convergence of networking and security. The Engage Preferred Services Partner (EPSP) designation within Fortinet company’s Engage Partner Program demonstrates GDT’s proven expertise in deploying, operating,

To maintain the security and integrity of your digital assets and company information, communication is key to addressing cyberattack risks and vulnerabilities. Read on for our top 10 ideas about communicating security information to your executive team, stakeholders and board members.

The most critical phase of an incident response process is recovery. Every minute business is disrupted by a cybersecurity incident, there is signifcant cost placed on the organization. A quick recovery response can help limit costs making recovery the absolute goal of responding to an incident. Organizations cannot skip critical

In the ever-evolving landscape of Cybersecurity, Zero Trust has gained significant traction as a powerful approach to securing digital assets. Zero Trust challenges the traditional perimeter-based security model by assuming that no entity, inside or outside the network, can be trusted without verification. However, Zero Trust is not just about

One of the biggest cloud security threats your company faces isn’t malicious. In fact, it originates from inside your IT organization. Accidental misconfigurations pose one of the leading security vulnerabilities IT organizations contend with in the cloud. According to a recent study, 79% of companies had experienced a cloud data

offshore security testing services

By Dr. Stephen Inocencio, PhD, DSI GDT Vice President, Security Advisory Services In IT, penetration testing is when a 3rd party is conscripted to simulate a cyberattack against your organization. It determines where you are from a security standpoint, and where you need to be. Where are your vulnerabilities and

Australia data storage regulations
Yesterday, Microsoft President and Chief Legal Officer Brad Smith said many of its government and enterprise customers want to build data centers outside of Australia. They’re very concerned with Australian legislation passed last December that may leave their data more ripe for the cybersecurity picking.
ATM security
It should come as no surprise to learn that there is malware that targets ATMs. It makes perfect sense: ATMs run software, require connectivity and are stuffed with cash.
Dunkin Donuts
Sugary sweet giant Dunkin’ Donuts was hit with its second cyber-attack in three months. Both attacks can be filed in a cyberattack category you may not have heard of—credential stuffing.