Our phones have been ringing off the hook the past few weeks (which is a good thing!) and we anticipate that this will continue as customers, prospects and partners work to get their arms around the new U.S. Department of Health and Human Services (HHS) Health Insurance Portability and Accountability Act (HIPAA) Omnibus Rule that [...]

Introducing Our Newest Partner: HealthGuard

We are excited to announce our new partnerships with HealthGuard, a health security and risk management services company. We are providing them with a full suite of Managed Security Services for their customers and partners, including HIPAA Essential, PCI Complete, managed firewall, intrusion detection and prevention, log management, and web application firewall (WAF). Additionally, HealthGuard [...]

Healthcare-record compliance is a SaaS problem too

Among companies handling patient records, the Health Information Technology for Economic and Clinical Health (HITECH) Act is old news. Going into effect in February 2009, this legislation sought to advance health information technology use standards to eventually make certain functions and safeguards mandatory, increasing the requirements for compliance with the Health Insurance Portability and Accountability [...]

Buying Peace of Mind with StillSecure and Hostway

We all have tasks we should work on but for some reason, they never seem to reach the top of the pile. In our personal lives, this can be anything from cleaning the oven to picking up the dry cleaning. In our work lives, these projects usually include things like expense reports, low priority emails, [...]

DOS using BIND DNS, by Sean Steadman, SOC Analyst

A recently discovered 0-day attack has been causing organizations with hosted domains everywhere mayhem.  The issue is a vulnerability found in the popular DNS application named BIND. This vulnerability is causing DNS servers to crash and interrupt service.  BIND versions with this vulnerability are unable to complete DNS requests for your hosted domains.  After BIND [...]

Duqu: A Breakdown, by Diego Ramirez, SOC Analyst

Duqu is the latest worm making noise in security circles and main stream media.  What’s interesting is how much we still don’t know about it. Even Virus/malware researchers at both Symantec and MacAfee can’t seem to agree specifically on the goal or exact purpose of Duqu.  The alarming thing is not only its modular design [...]

“Morto”, a new worm spreading in the wild, by Rory Smith, SOC Analyst

The Morto worm has been detected on Windows based machines, most notably devices running Windows Server 2003 R2 and Windows XP.  What’s new with this worm is the way in which its spreads; whereas worms commonly propagate utilizing e-mail services or known vulnerabilities/exploits, Morto attempts to spread itself via RDP on a network. RDP (Remote [...]

Putting a Dent in AES-128, by Joshua Roback, SOC Supervisor

The Advanced Encryption Standard (AES) has been a staple for both personal and enterprise encryption since its inception back in 2001.  Up until recently, this standard has stood tall, unaffected by fruitless brute force attacks.  In fact, it would theoretically take 10,000,000 years to crack AES-128 via simply brute force.  AES-128, though, has officially been [...]

“DNS NAPTR Query Vulnerability”, by Cesar Salas, SOC Analyst

A recently discovered Microsoft DNS Server Vulnerability has surfaced, that until recently patched allows any attacker to execute any file type with user level permissions.  The resulting uninitialized memory could intrinsically result in a ‘Denial of Service’ on the target device.  Fortunately on Tuesday, 8/9/2011, Microsoft patched this vulnerability; however a strong lesson is to [...]

The use of legitimate channels to distribute malicious software to users, by Rory Smith, SOC Analyst

With security companies recording known and popular domains used for spreading malicious software, malicious users are constantly looking for new channels to launch their illegal campaigns. A growing trend in the wild is the distribution of malicious code through legitimate domains. A recent victim to this kind of activity would be none other than Amazon [...]