Security Solutions
-
Is the End of Passwords Near?
03/15/22Most people have countless passwords for countless applications. Passwords are inherently insecure because they can be stolen or guessed. The adoption of password...
Read blog
-
What is Double Extortion Ransomware?
01/26/22Although this is not a new type of ransomware strategy, double extortion, is making quite the comeback. Double extortion, pay-now-or-get-breached, is where attackers...
Read blog
-
Ransomware attacks are more common than most people think. They occur globally every 10.2 seconds and over 55% of these attacks are aimed...
Read blog
-
A business needs to ensure they have both a business continuity plan and disaster recovery plan. They are similar plans that offer a...
Read blog
-
The last year has refined what disaster means for everyone. It is more important than ever that you reevaluate your disaster recovery solution...
Read blog
-
The world would be a much safer place if only we could simulate attacks on every environment to determine how at risk we...
Read blog
-
Patch Management Best Practices
08/19/21At home, those pop-up reminders to update your hardware and software require little more than click “OK” to get the latest upgrades to...
Read blog
-
As we all know by now, cybercrooks do not discriminate. They will go after any vulnerable business in any market. Manufacturing is a...
Read blog
-
On March 2, Microsoft released critical updates to secure Microsoft Exchange Servers from 4 vulnerabilities. They asked that organizations apply the patches with...
Read blog
-
What is a Cybersecurity Framework?
03/01/21Almost every organization must comply with a mixture of state-mandated, industry-specific, and international cybersecurity regulations. A cybersecurity framework is a series of documents...
Read blog