BLOG POSTS

BLOG POSTS

Three Pillars of Cyber Security

Defining the Three Pillars of Cyber Security

With new and complex threats surfacing the modern IT landscape every day, businesses are struggling to stay ahead of the curve. The stats are intimidating while the high price of a data breach is inching up to $7.35 Million. Malicious events are on the rise while large, medium, and even small organizations are targets. Old … Continue reading “Defining the Three Pillars of Cyber Security”

LEARN MOre

November 2, 2017
BLOG POSTS
KRACK Attack

KRACK Attack – What it is & How to Mitigate

On Monday, a serious weakness in WPA2, a protocol that secures all modern protected Wi-Fi networks, was released. This vulnerability was dubbed KRACK attack because a potential attacker within range of a victim can exploit these weaknesses using key reinstallation attacks. This attack is so concerning because it works against all modern Wi-Fi networks. Attackers … Continue reading “KRACK Attack – What it is & How to Mitigate”

LEARN MOre

October 18, 2017
BLOG POSTS
Ransomware Attack

New Ransomware Attack Report Shows Many Companies are Unprepared

Cybersecurity insiders, along with many of their security partners, recently conducted an in-depth study to gather insights on the latest ransomware trends. The report shows that organizations are overwhelmed by frequent, severe ransomware attacks – which have now become the number one cyber threat to organizations. Ransomware attacks, in which hackers encrypt an organization’s critical … Continue reading “New Ransomware Attack Report Shows Many Companies are Unprepared”

LEARN MOre

October 10, 2017
BLOG POSTS

Protect The Backups: Ransomware Vs Backup

Security incidents are trending topics these days – especially with October being security awareness month. Why? It is an easy pay day for threat actors to exploit human error. Ransomware is a common threat vector that hackers are using to lock computers and data for ransom. Once paid, data is released (some of the times, … Continue reading “Protect The Backups: Ransomware Vs Backup”

LEARN MOre

October 3, 2017
BLOG POSTS
Enhanced Visibility

Enhanced Visibility to Protect Your IT Environment

Innovation growth can mean a lot of things for an organization – new and improved functionality, efficiency, cost savings – but, it can also mean newly added risk. Innovation and the rapid increase of connected devices has significantly increase the attack surface for threat actors. To stay ahead of the evolving threat landscape, organizations have … Continue reading “Enhanced Visibility to Protect Your IT Environment”

LEARN MOre

September 26, 2017
BLOG POSTS
Cloud Security Concerns

Handling the Security Concerns of Public vs. Private Cloud

The Cloud brings significant benefits to your IT operations. However, it also brings new security risks. While it is easy to get lost in the luster of the cloud, it is important to fully understand how to handle these newly emerging data risks. This is the only way that you can truly take advantage of … Continue reading “Handling the Security Concerns of Public vs. Private Cloud”

LEARN MOre

September 21, 2017
BLOG POSTS
Equifax Data Breach

The Equifax Data Breach: What’s the deal?

The Equifax data breach news is a bit of a shocker for most people. Roughly 143 million Americans were affected by this breach. This is most of the US adult population. The highly sensitive data that was leaked included social security numbers, home addresses and credit card information of Equifax users. And what caused this … Continue reading “The Equifax Data Breach: What’s the deal?”

LEARN MOre

September 14, 2017
BLOG POSTS
Email Cyber Attack

The 7 Red Flags of an Email Cyber Attack

There’s no doubt that cyber-crime is one of the fastest growing and evolving crimes as of recent. With the rising tide of cyber theft, in just two years, we are projected to see a 15x increase ($5 Billion – up from $325 million) in global ransomware damage costs in 2017. Ransomware and other viruses are … Continue reading “The 7 Red Flags of an Email Cyber Attack”

LEARN MOre

September 12, 2017
BLOG POSTS
Security Toolbox

Part 3: Minimizing the Fragmented Security Toolbox

Today we are going to finish up our three-part blog series that has been examining trends in attack behaviors and vulnerabilities in 2017 via the Cisco Midyear Cyber Security Report. We will be concluding this series by discussing how organizations of all sizes can take control of their security posture and protect their mission critical … Continue reading “Part 3: Minimizing the Fragmented Security Toolbox”

LEARN MOre

September 6, 2017
BLOG POSTS
Hybrid Disaster Recovery Made Easy with the Cloud

Hybrid Disaster Recovery Made Easy With The Cloud

Back in the day, organizations had to rely on manual disaster recovery options. This required physically shipping tapes offsite and hoping that you never had a need to use them. At the time, more functional disaster recovery options were expensive and required a site owned by the customer. In the past half a decade, the … Continue reading “Hybrid Disaster Recovery Made Easy With The Cloud”

LEARN MOre

September 1, 2017
BLOG POSTS
Page 1 of 1112345...10...Last »