Blog

Read the latest posts from the Zyston team, including archived editions of Zyston’s monthly security newsletter, The Roundup.

8 Ways to Harden Office365 Environment

We have all started using hosted email and other cloud based applications in the IT realm. With Office365 there are a few things to consider doing to help harden and better secure your Office365 platform. 1. Turn off PowerShell access for all users except...

Remote Workforce Monitoring

Zyston and Sumo Logic are partnering to provide remote workforce monitoring capabilities to companies affected by the COVID-19 pandemic.

The Roundup – March

APRIL 2, 2020 | ISSUE NO. 2   The Roundup is a bit-sized security newsletter designed to be read during boring meetings while providing you with material to share during your next sales lunch.Zoom Meeting Security Best PracticesAs the workforce moves remote, ...

Attackers Use Texts to Exploit COVID-19

Executive Summary Zyston has noted an increase in cyber attacks in since the COVID-19 outbreak began spreading across the world. Recently, Zyston associates have noted threat actors using text messages to try to trick individuals. Zyston has noted three particular...

Zoom Meeting Security Best Practices

Before the Meeting Set a password for your meeting to ensure only those invited can attend. Disable Join Before Host to ensure only the Host can start and control the meeting. Settings > Schedule Meeting > Join Before Host Create a Waiting Room by enabling the...

COVID-19 Threat Intelligence Report

Executive Summary In response to the global COVID-19 outbreak, many organizations are temporarily moving to remote work. A majority of these firms are not equipped for remote work, but they are being forced into it without preparation. Thus, security gaps are being...

The Roundup – February

FEBRUARY 24, 2020 | ISSUE NO. 1   The Roundup is a bit-sized security newsletter designed to be read during boring meetings while providing you with material to share during your next sales lunch.The Truth Behind Metrics According to the 2019 Verizon Data...

DoD Introduces New Information Security Standard

At the end of January 2020, the U.S. Department of Defense (DoD) approved the Cybersecurity Maturity Model Certification (CMMC) with plans to apply this new standard to up to 3,000 subcontractors by the end of 2020. Unlike prior self-attestation methods, this new...

The Truth Behind Phishing Metrics

According to the 2019 Verizon Data Breach Investigations Report (DBIR), the click rate in phishing simulations is around 3%. Importantly, the DBIR analyzes data across the entire cybersecurity landscape and produces aggregated metrics. Aggregated analysis can provide...

Zyston Principal Jonathan Steenland Presents at ATL CTO Forum

Companies are under equal pressure both to innovate and disrupt the markets they serve while at the same time ensure company assets and customers are protected. What happens when these goals work against each other? Does innovation have to put your company at greater...

Subscribe to our monthly security newsletter: The Roundup!

Information Security Solutions

Dallas | Atlanta | National

469-458-6670