iSCSI vulnerability reveals another avenue hackers are exploiting

There’s seemingly no end to the avenues for hackers to penetrate protected systems. From simple (yet dishearteningly still effective) email phishing to DDoS overloads to high-complexity malware/ransomware custom-built for specific targets, hackers are becoming ever more effective and creative in gaining access to sensitive systems. But the first line of defense is still your employees, and in a recent snafu, … Read More

Executive phishing — the newest security threat sweeping the nation

In any enterprise, keeping your team abreast of the newest and most nefarious security threats is paramount to both operations as well as your bottom line. According to IBM’s ‘Cost of Data Breach Study‘, “the global average cost of a data breach is up 6.4 percent over the previous year to $3.86 million. The average cost for each lost or … Read More

What to know about Windows 7 end of life

What’s true in life is also generally true in software: All good things must come to an end. And for Windows 7, that end is nearly in sight. Why Windows 7 is a big deal Consumers are used to updating their hardware to the newest, latest and greatest — especially when it comes to upgrading to the shiniest mobile models … Read More

Largest-ever trove of breached data discovered — what you need to know about Collection #1

Massive hacks shouldn’t come as a huge shock to anyone anymore. Unfortunately, global-scale hacks are becoming both more frequent and more devastating with every passing year. We’ve seen NotPetya wipe out tens of billions of dollars and cripple worldwide infrastructure. Marriott and Starwood Hotels lost hundreds of millions of users’ personal data, including both financial information, and in some cases, … Read More

4 cybersecurity threats to watch out for in 2019

2019 hacking threats

2018 saw a glut of cybersecurity disasters at some of the highest levels of industry and government. From the ~$10 billion NotPetya debacle to Marriott’s 500-million-guest-record theft (which actually started in 2014 and lasted 4 full years, to be fair), it was a banner year for digital criminals. This dangerous environment has cybersecurity as a top item on a lot of … Read More

Is voice hacking the next line of attack for threat agents?

voice hacking

It’s a brave new technological world out there, and it seems to reinvent itself every couple of years. What was inconceivable only a few years ago goes from Hollywood fantasy to ubiquity in the proverbial blink of an eye. Virtual assistants like Iron Man’s J.A.R.V.I.S. leapt off the screen and into our homes via Alexa and Google Home. James Bond … Read More

Proactive Service vs Reactive Support

When we talk with business leaders we often hear about their perception of Proactive Service vs Reactive Support.  Many business have been told that Proactive Support includes things like patch updates, anti-virus checks, computer monitoring, and so on.  While you can consider these items to be proactive in nature, doing them independently doesn’t offer much value to the end result … Read More

Are You Hitting Your Goals?

Straight and simple. Are you hitting your goals? Do you have them written out for the quarter, year, next 3 years? What do they look like? Most importantly, how is technology helping you? Can you answer that last question directly? Most companies can’t. In fact, most companies can’t answer much at all about the impact technology makes on their business. … Read More

Technology Pain Threshold

I’m always surprised by the difference in pain thresholds between companies.  One company will put up with all sort of terrible atrocities in their infrastructure and never say a word.  Another company will raise hell the moment a printer doesn’t work.  I suppose this is a matter of culture, but what is that actual impact on the business?  The Emerson-Ponemon … Read More