Atec Group

Atec Group

Helping businesses in Upstate New York, NYC, and beyond to grow by utilizing technology as a stepping stone to competitive advantage.

518.452.3700
Email: [email protected]

Atec Group
1762 Central Avenue, Albany NY 12205

Open in Google Maps
CALL US: 518.452.3700
  • About Us
    • Meet the Team
  • Solutions
    • Health Check Assessments
    • Storage Solutions
    • Virtualization
    • Backup & Recovery
    • Workload Automation
    • Cybersecurity
    • Managed Services
    • Procurement
    • Networking
    • Cloud Integration
  • Technology Partners
  • Careers
  • Blog
  • Contact Us
  • Home
  • Blog
  • Technology
  • Beyond the Buzzwords with Jason Krolak
August 18, 2022

Beyond the Buzzwords with Jason Krolak

Beyond the Buzzwords with Jason Krolak

by ATEC Group / Wednesday, 16 January 2019 / Published in Technology

Welcome to our newest blog series, Beyond the Buzzwords! Every month, a new ATEC Group team member will join us to discuss some of the top buzzwords in their specialty.

This month, we’re featuring Senior Account Executive Jason Krolak, who dives deeper into some of the overused phrases he encounters as ATEC’s Cybersecurity Champion.

Beyond the Buzzwords: Cybersecurity Edition

“Hi readers, Jason Krolak from ATEC Group here! Today I’m breaking down five cybersecurity buzzwords that many of us in the IT industry hear on a daily basis. Let’s get started!

  1. Holistic Approach: Arguably the most overused phrase of 2018, but also one of the most important. Here at ATEC, the term “holistic approach” means looking at a client’s overall security posture and taking a vendor agnostic and tool agnostic approach to assessing where they are and where they need to be. 
  2. Security Posture: A close runner up to Holistic Approach, a “security posture” refers to looking at the client’s overall security picture. This would involve overlaying their existing security strategy over the 5 pillars of the NIST Framework to look for holes or gaps in their armor. 
  3. Zero-Day: This refers to a security tool’s ability to detect and respond to an attack that had not been previously defined. Here at ATEC, we take this a step further by utilizing tools that listen to the dark web in order to understand what vulnerabilities are being weaponized. This way, we can assist our clients in protecting against an attack before it becomes a zero-day.
  4. IOT: Any device that is hard wired (or wireless) and attached to your network, but not part of your normal infrastructure (i.e. thermostat, medical device, HVAC controller). If you look at three of the most recent major cybersecurity breaches highlighted in the news,  you will see that none came in through the firewall. The breaches actually involved an aquarium monitor, an HVAC sensor, and a heart monitor!
  5. Social Engineering: This refers to your staff being manipulated into infecting your network unknowingly. You can have the most secure network, but if an end user opens a phishing email, gives their UN/PW over the phone, or allows the wrong person in an ‘Iron Mountain’ uniform in to pick up your tapes, your security will be compromised.”

 


Interested in learning more about ATEC Group’s cybersecurity offerings? Please feel free to reach out to Jason Krolak via email or by phone at (518) 724-3153.

  • Tweet

What you can read next

Q4 Promotions from Our Account Executives
Arnold Discovers the Power of Trend Micro
The Misadventures of Arnold from Accounting

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • About Us
    • Meet the Team
  • Solutions
    • Health Check Assessments
    • Storage Solutions
    • Virtualization
    • Backup & Recovery
    • Workload Automation
    • Cybersecurity
    • Managed Services
    • Procurement
    • Networking
    • Cloud Integration
  • Technology Partners
  • Careers
  • Blog
  • Contact Us

© 2021 Atec Group

TOP Cleantalk Pixel