Category Archives: Blog

Are you minding the gap? The cybersecurity skills gap, that is.

It used to be that when you heard or saw ‘mind the gap,’ you knew it was the familiar London tube warning to carefully step over the space between the station platform and the train car. A gap is never a good thing. Oh, how things have changed. Today, everyone’s talking about minding the gap—but not in transportation—in cybersecurity. The digital world has changed how we think, what we do, and how we protect ourselves. Everything is data. Everything needs...
Read More

Crozdeck Infographic: “Is your business safe from hackers in 2017?”

Did WannaCry make your company want to cry? Did NotPeyta have you hoping that it was not your organization? With large-scale cyber-attacks, such as hacking, malware and unintended disclosures, becoming more frequent and severe in 2017, there has never been a better time to invest in solutions that protect your customers’ data and reputation while mitigating potential risks. Check out the recent infographic from the IT & Security team at Crozdesk and learn about how solutions like GigaTrust are...
Read More

Keeping Your Emails and Documents Safe

Original article published on VPNMentor. The vast majority of our confidential information today is stored in emails and in documents. That is why GigaTrust is dedicated to making it both easy and safe to share these documents. Their GigaCloud collaboration platform not only encrypts emails/documents at rest and in transit, but also provides in use protection by manually or automatically applying usage rights In this interview with Robert Bernardi, the founder, chairman, president, and CEO of GigaTrust, we not only discuss the...
Read More

What US Businesses Need To Know About the GDPR Law

Excerpt: EU’s GDPR law will go into effect in May 2018 and will affect many US-based businesses. Here’s what you need to know and what to do to stay compliant.   If your organization processes any kind of personal data, you’ll need to assess how the EU’s GDPR law will affect your business. Even for companies based in the United States, it’s very likely that they have clients or customers who are EU citizens — which means this law will affect many...
Read More

Shark Week: 6 Tips to Secure Your IT Tackle Box

Original article published on VMBlog. Scientists recently dispelled the myth that sharks attack humans because they mistake them for other prey. In fact, sharks can see clearly below the murky waters. But, it’s not as easy for victims of phishing attacks to see what’s lurking behind an attached document or link within an email. Email is the lifeblood of communications for organizations around the world. Among the 296 billion emails sent daily, there are dangerous emails lurking within. A successful email attack...
Read More

How to Set Up Your Supply Chain Management to Comply with Special Publication NIST 800-171 Compliance

If you’re a contractor or sub-contractor to governmental agencies and organizations, you’ve probably heard of the government’s new mandate by the National Institute of Standards and Technology, NIST Special Publication 800-171 titled Protecting Controlled Unclassified Information (CUI) in Nonfederal Information Systems and Organizations. This special publication was created with the objective to protect information and communications technology (ICT) systems operated by the federal government and its contractors from cyber threats and attacks within the supply chain. This mandate was designed to protect sensitive government information from...
Read More

A Day in the Life of an Email

Ever wonder what your emails are up to when they aren’t protected by an endpoint security solution? GigaTrust has created an infographic that illustrates what “a day in the life of an email” actually looks like… and the threats that may occur if emails are not properly protected. Keep this in mind when sending, opening, forwarding and reading the next email to hit your inbox. Like this infographic? Use the below embed code to share. <h3>Share this Image On Your Site</h3><textarea...
Read More

Creating a Custom PowerShell DSC Resource

We’ve been using PowerShell Desired State Configuration (DSC) to automate the deployment of GigaCloud on Azure and on-premises Hyper-V virtual machines. Most of what we do with DSC comes from the open-source, Microsoft-supervised PowerShell DSC modules found on NuGet, and available to see at https://github.com/PowerShell. For some of our configuration tasks, though, we need custom functionality to get things installed and configured. For those, we’ve created DSC resources using PowerShell. The Script resource If you’re familiar with DSC, you’ll know about...
Read More

Prevent IT Security Breaches In Federal Government Environment with Cloud Collaboration Service

You don’t have to be an “insider” to know about all the IT security breaches that have affected the US government in recent years. The IRS was hacked in 2015 and tax records for 330,000 taxpayers were used to collect bogus refunds. More recently, the Russian hacker Rasputin has breached a total of 63 US and UK universities and US government agencies. Not to mention the 2016 DNC hack that involved the leak of 19,252 emails and 8,034 attachments that...
Read More

Creating a new forest and multiple domain controllers with PowerShell DSC

We’re continuing our series on automating the installation of GigaCloud using PowerShell DSC. GigaTrust is creating a fully automated solution to set up and install GigaCloud™ in whatever configuration our customers want: on-premises in Hyper-V and VMWare, in their own cloud subscriptions using Microsoft Azure, and even fully managed by GigaTrust as Software as a Service (SaaS). GigaCloud is deployed as a virtual appliance, with required services deployed across multiple virtual machines to provide redundancy and scale. To keep the...
Read More