Blog

Home/Blog
Blog2021-10-08T11:09:37-05:00

October 2021

September 2021

Your Confluence instance was hacked if you were running an affected version on August 25th or thereafter.

There were ample signs something big was brewing as all US agencies were issuing warning for Labor Day Weekend.  They were too slow to provide useful information, but they were right.  On August 25th Atlassian [...]

March 2021

Employee is being fired: an explanation for why wiping a device is likely not an option.

Very often an organization falsely believes they can wipe a device in the event of an employee termination using a remote wipe command.  While remote wipe technology may be available for some/all mobile devices, it [...]

August 2020

June 2020

Successfully Transitioning to Filevine Legal Case Management.

Law firms are increasingly interested in adopting software-as-a-service legal case management solutions to modernize their existing practices. We have been asked repeatedly to provide security insights into adopting SaaS products including CasePeer, LEAP, PracticePanther, Clio, [...]

May 2020

Maximum stored procedure, function, trigger, or view nesting level exceeded

Our team provides on-premise and virtual private cloud upgrade management for a number of products including TrialWorks case management software. This week we rolled out TrialWorks version 11.4a and all of our upgraded organizations were [...]

February 2020

COVID-19 prompts the activation of disaster response plans

TechBento considers the COVID-19 threat as a high-risk event with severe disruptions to systems, business operations, and financials.  We anticipate heavy influx of ill-prepared organizations seeking last-minute guidance on continuity planning, remote access, requests for [...]

January 2020

November 2019

October 2019

September 2019

August 2019

July 2019

September 2018

April 2018

December 2017

November 2017

September 2017

February 2017

NIST Launches Beta Site for the Computer Security Resource Center (CSRC)

The NIST CSRC Redesign Team have been developing a new version of CSRC, and today you can access the beta release at https://beta.csrc.nist.gov. It will be available alongside http://csrc.nist.gov for several months as NIST continues to [...]

Cybersecurity

Cybersecurity means protecting electronic devices and electronically stored information. Cybersecurity is a component of information security and addresses protection and restoration of information technology within an organization. All organizations are different and thus require different levels or protections. Likelihood is the chance that a threat will affect a business and serves as a guide in determining what protections should be put into place.

Readiness

Strategic thinking is at the heart of information security and each organization needs to meet demands of adequate security. Any company, big or small, should be capable of doing an inventory of all information technology assets and analyzing risks. For small organizations this can be as simple as understanding each asset’s confidentiality, integrity, and availability needs; rating it’s importance to the business and acceptable recovery points and time windows; and allocating resources for methodical solutions to the most important parts.
Go to Top