If business continuity and disaster recovery were people, they’d be those slightly annoying relatives always pestering you to be “better safe than sorry.” While you may get tired of hearing the same message over and over again, they are unfortunately prophetic when a disaster — sayyyy, like a data breach — decides to pay an unsolicited visit. Business continuity is … Read More
Data integrity: just as important as data security (but not the same)
We’re on a bit of a kick to define important terms in businesses’ approach to technology. Last month it was IT management vs cybersecurity management. Why are we defining things like IT management, cybersecurity management, data integrity and data security? Because properly framing the conversations around each can have profound impacts on how businesses can correctly approach these disciplines. In … Read More
CoVid-19 phishing scams are on the rise — what to know
No event in living memory (unless you’re 106 years old) has impacted daily life across the globe as completely and deleteriously as CoVid-19. The coronavirus and its disease have upended every facet of daily life for basically everyone in this country. Every child is home schooled now; every office is at home unless you’re an essential worker (our thoughts, thanks … Read More
Getting our clients back to work after severe weather wracks Texas
The last thing you want to worry about when severe weather strikes is your company’s data—here’s how we got our clients back to work with minimal downtime.
Flipboard suffers data breach, responds expertly
Data breaches, sad as it is to say, are a part of corporate life now. Despite the best laid intentions (and expertly designed security systems) no system is truly hack proof. As long as humans have logins, there will be vulnerabilities in sensitive systems. That doesn’t mean you shouldn’t do everything in your power to prevent them, obviously, but it … Read More
iSCSI vulnerability reveals another avenue hackers are exploiting
There’s seemingly no end to the avenues for hackers to penetrate protected systems. From simple (yet dishearteningly still effective) email phishing to DDoS overloads to high-complexity malware/ransomware custom-built for specific targets, hackers are becoming ever more effective and creative in gaining access to sensitive systems. But the first line of defense is still your employees, and in a recent snafu, … Read More
The skinny on LockerGoga, a terrifying new ransomware variant
We’ve seen all manner of ransomware in the last decade. From innocuous varieties to the devastating ones, ransomware is one of the largest (and growing) threat vectors for cybersecurity teams (or managed service providers if you outsource that sort of thing). One of the newest iterations on the scene, with a terrifying wrinkle, is called ‘LockerGoga’ — here’s what it … Read More
Executive phishing — the newest security threat sweeping the nation
In any enterprise, keeping your team abreast of the newest and most nefarious security threats is paramount to both operations as well as your bottom line. According to IBM’s ‘Cost of Data Breach Study‘, “the global average cost of a data breach is up 6.4 percent over the previous year to $3.86 million. The average cost for each lost or … Read More
7 New Year’s resolutions to keep your company’s data safe
In our first post of 2019, we laid out 4 areas of cybersecurity threats to watch out for in 2019; but telling you about threats isn’t enough to help you combat the malicious actors out there, so we also promised some New Year’s resolutions to help. So, here you are: 7 resolutions to help keep you digitally safe in 2019: … Read More
Infrastructure hacking against the U.S. is proliferating — what does that mean for you?
As we wrote about last month, cyberattacks are getting both more complex as well as destructive. For so many people, this has only meant credit card companies sending you replacement cards from time to time, or possibly Equifax offering you free credit monitoring for a year after allowing a massive data breach, or an inkling that your social security number … Read More
- Page 1 of 2
- 1
- 2
Dive straight into the feedback!Login below and you can start commenting using your own user instantly