Welcome to Our Blog

In-depth security analysis, news, and advice

Jan 10


5 Security Predictions for 2017: What Will be Your Greatest Risk?

Welcome to the New Year. From all of us at Great Bay Software, we wish you a safe and secure 2017. With recent news filled with stories of hacking by government actors, the prevention of cyberattacks...

Jan 03


A ‘Must Read’ - Gartner on IoT Security

Gartner recently published their Market Guide for IoT Security, in which they recommend strategies and solutions that include those of Great Bay Software. Here’s a quick ‘take-away’ on their research...

Dec 27


7 Best Practices to Secure Enterprise IoT

Connected devices and the broader Internet of Things (IoT) ecosystem promise to deliver new efficiencies for industrial processes, environmental controls, fleet management, package delivery—and much,...

Dec 20


What is Enterprise IoT Security?

  Scoping Out Enterprise IoT Security Cyber-attackers are turning their attention to the Internet of Things (IoT). In October 2016, the Mirai botnet was used to launch a DDoS attack against the DNS...

Dec 15


IT Dieting 101: Stop Stretching Your Technology

The deployment of network security typically grows organically in enterprise organizations. This requires IT to be able to support and integrate a wide range of solutions, technologies and vendors....

Nov 29


How to Protect Your Financial Institution from DDoS Attacks

Previously we discussed the reality and risks of DDoS attacks via IoT endpoints. Financial institutions, in particular, are high profile targets. I’m sure you’ve seen headlines about the five top...

Nov 17


3 Reasons Why Medical Device Security is Your Top Risk

Hospitals have become the mother lode for cybercriminals. The convergence of valuable data, network backdoors and the vast array of unprotected biomedical devices has created a perfect storm. Here...

Nov 15


The Enterprise IoT Market: Just How Big is Big?

Connected devices will power the next wave of enterprise innovation and efficiency. Connected devices, along with the applications, communications and analytics in the Internet of Things (IoT)...

Nov 10


Security Risks Associated with Medical Devices

Most healthcare institutions have made a significant investment in security solutions to protect their networked resources and facilities from breaches. But despite these efforts, most hospital and...

Nov 08


How do we secure IoMT Devices?

Following the flood of news stories covering the breach of patient data, HIMSS instituted an annual research study in 2015. In 2016, based on feedback from 183 IT professionals, the survey gauged the...

Subscribe to Blog Updates