Immunize your Business

At the upcoming Information Security Summit, I will be presenting on the topic, “Eradicate the Bots in the Belfry.”  Bots are used for a variety of malicious activities including sending spam and conducting DDoS (Distributed Denial of Service) attacks such as those recently in the news.  Your network is probably hosting bots right now.  A recent study showed that 40 percent of computers have one or more pieces of malware on them and this malware could be attacking other companies or disclosing important company or customer data.

So how can you immunize your business against this threat?  First, obtain a baseline of the activity on business computers so that unusual activity can be identified.  Setup monitoring and metrics to alert you to unusual activity and create an incident response plan to handle infections and data breaches.

Attend the summit or contact us for more information on how to protect business and others.

You can view the presentation here:

About The Author

Eric Vanderburg

Eric Vanderburg is an author, thought leader, and consultant. He serves as the Vice President of Cybersecurity at TCDI and Vice Chairman of the board at TechMin. He is best known for his insight on cybersecurity, privacy, data protection, and storage. Eric is a continual learner who has earned over 40 technology and security certifications. He has a strong desire to share technology insights with the community. Eric is the author of several books and he frequently writes articles for magazines, journals, and other publications.


  1. I am curious to find out what blog platform you are using? I’m experiencing some minor security issues with my latest blog and I’d like to find something more secure. Do you have any suggestions?

    1. It can be tough to migrate to a new platform. I would first see if you can shore up the security problems with your current system. Disable any features you are not using. Update your install and plugins to the latest versions to take advantage of security fixes. If you are hosting it yourself, secure the box it is on. If someone else is hosting it, make sure that they are a reputable vendor. I hope that helps.

  2. The speaker evaluations for the “Eradicate the Bots in the Belfry” presentation at the Information Security Summit have been released and I would like to thank everyone who submitted an evaluation. There were 19 evaluation responses out of the 52 people who attended the session. Overall, the presentation was rated “very good.”

  3. Hello! I just would like to give a huge thumbs up for the very good info you’ve here on Security Spotlight. I are going to be coming back to your blog for much more soon.

Leave a Reply