Insights focusing on: Disaster Recovery
Tips to lock down your backup infrastructure
Ransomware that’s aimed at backup infrastructure can put critical backups at risk as well as expose sensitive corporate data. Ransomware has unfortunately matured in recent years. Attackers have ...
Portland Ice Storm: Pipe burst
President Trey Lackey had been out of town during the weekend ice storm in January. He had two families holed up in his house because of power outages. ...
ATOs on the Rise: Let Trusted Providers Step In
A catering company owner in Kettering, Ohio started receiving odd emails and text messages about packages she never ordered, insurance premiums she did not authorize, and more. ...
Hacker season – top cybersecurity tips for the holidays
A Darktrace report observed that there is a 30 percent increase in the average number of ransomware attacks over the holiday period compared to the monthly average. The researchers also established a 70 percent average increase in attempted ransomware attacks in the months of November and December, compared to January and February. Don’t let the holiday festivities distract you from keeping your data safe. ...
Can you survive an Internet outage?
You might be thinking, “Why should I care about SD-WAN? My internet is pretty stable. I haven’t had any issues so far.” That’s what many businesses think. ...
Preventing a data breach for your most vulnerable devices
Here are some interesting, albeit shocking, stats about the most vulnerable devices we use on a daily basis: 47% are security cameras installed on company networks 15% are ...
Next year will see more security spending
The recent State of IT report performed by Spiceworks has projected that business security spending budgets. These are going “to increase in 2022. One specific area that will continue to see growth is managed security services.” ...
Hacker phishing – How is it used as an attack?
When hackers are the most successful with their phishing expeditions, what is involved in their attack? Hackers use phishing to steal your company’s data in many ways. From the simplest way in, like the click of a link, to extremely complicated ransomware incident strategies. ...