Backstop User Conference - Chicago Skyline

Setting the Standard for the Alternative Investment Industry – Backstop Solutions User Conference

CIT Presents at Backstop Solutions User Conference The concepts of risk, information management, cybersecurity, 3rd party due diligence, and vendor management are nothing new for the Alternative Investment industry. One of the investment industry’s leading software technology companies, Backstop Solutions, brought these topics center stage during their user conference in Chicago, IL. Backstop is the…

KRACK-vulnerability

What You Need to Know about KRACK Attacks

Taking a deeper look at the KRACK Wireless Vulnerability Background In May of 2017, security researcher Mathy Vanhoef published a technical paper outlining a potentially catastrophic vulnerability within an encryption protocol used within Wireless Computer Networks. This vulnerability has taken the “protected” out of Wi-Fi Protected Access II (WPA2) Wireless Networks. Those networks, both corporate…

is my copier spying on me

Is My Copier Spying on Me?

Vulnerabilities in IoT As the phrase “Internet of Things” or IoT enters our cultural vernacular, many wonder what this new term means. The Internet of Things Simply put, IoT is the term given to connecting non-traditional devices to a computer network – most notably the Internet. Businesses have been connecting “things” to the network for…

Remember . . . Always Practice Safe BYOD

Bring Your Own Device (BYOD) Into Your Business No matter what blog or magazine read these days, it seems like everyone is talking about today’s increasingly mobile workforce and the BYOD (Bring-Your-Own-Device) movement. We live in an exciting time when work can be done at any time from any place. Employees love the fact that…

hyper-convergence

What is Hyper-convergence?

What is Hyper-Convergence?   It seems like a new buzzword or acronym is developed in the IT industry daily. As a small business, it can be difficult to cut through the noise and identify what technology is the right fit for you. Most recently, the term “hyper-convergence,” or hyper-scale computing, has made its debut. This…

The Situation – Microsoft Windows XP – Part 2

Updates: Will Microsoft Security Essentials be supported after April 8, 2014? Microsoft Security Essentials will not be available for download on Windows XP after April 8, 2014. If you already have Microsoft Security Essentials installed, you will continue to receive anti-malware signature updates through July 14, 2015. However, please note that PCs running Windows XP…

The top 5 ways to avoid getting hacked while visiting Russia (or anywhere, for that matter)

Yesterday (Feb 5 2014) NBC News ran a story claiming that if you bring your mobile phone or laptop to the Sochi Olympics, it’ll immediately be hacked the moment you turn it on. The story was fabricated. After further examination we found that the technical details of the hack didn’t make sense. Really, the exploit…

Dropbox: Taming the Wild West

A modern-day Wild West can be found in the slapdash enterprise use of cloud-based file storage and sharing. But new security technologies puts user-managed security atop those platforms without burdening the IT department with lots of administrative overhead. “Transparent layers of encryption with enterprise-owned and managed private keys can now be implemented on top of…