How an Outsourced Backup Solution Enhances Data Protection

By |2021-01-05T21:00:07+00:00January 5th, 2021|Backup Recovery, Managed Services, Security|

A backup failure on Oct. 1 forced the Tokyo Stock Exchange to halt all trading for the entire day, leaving frustrated investors unable to capitalize on surging stock prices. Economists have suggested the outage creates uncertainty that may ultimately drive many foreign investors out of the world’s third-largest equity market. Sadly, such backup failures are [...]

Top Cyberthreats to Watch for in 2021

By |2020-12-03T13:35:51+00:00November 30th, 2020|Cyber Security, Internet Security, IT Security, Security|

During a year in which the global health crisis brought immeasurable change to our personal and professional lives, it has been hard to determine which has spread faster — the coronavirus itself or the cybersecurity threats that attempt to exploit it. Analysts say cyberattacks have increased by 600 percent since the start of the pandemic [...]

Feds Say Ransomware Payments May Lead to Sanctions

By |2020-11-11T14:18:01+00:00November 11th, 2020|Cyber Security, Internet Security, IT Security, Security|

Chances are, you’ve never heard of The Office of Foreign Assets Control (OFAC). However, if your company is trying to recover from a ransomware attack, you could unwittingly find yourself in OFAC’s crosshairs and subject to business-crippling fines and penalties. OFAC has been called “the most powerful yet unknown agency in the U.S. government.” An [...]

Revised Guidelines Open the Door to Better Password Management

By |2020-11-05T14:33:09+00:00November 4th, 2020|Cyber Security, IT Security, Security|

“Open Sesame!” With this phrase, the title character of the 18th-century folk tale “Ali Baba and the Forty Thieves” was able to gain entry to a secret cavern filled with gold, silver and other riches. The part of the story most people forget is that Ali Baba’s brother was later killed after he forgot the [...]

Why Behavior Analytics Is an Essential Tool in Today’s Threat Environment

By |2020-10-21T02:13:29+00:00October 21st, 2020|Cyber Security, IT Security, Security|

Most conversations about IT security — and investments in IT security — tend to focus on external forces trying to infiltrate a network at the perimeter, steal sensitive data and sell it to the highest bidder. However, many experts agree that insider threats represent a significant security risk to organizations. An insider threat is typically [...]

Three Ways to Boost Email Security

By |2020-09-22T21:27:31+00:00September 22nd, 2020|Internet Security, IT Security, Security|

In 1978, a marketing manager with Digital Equipment Corporation sent an unsolicited electronic message to hundreds of ARPANET users promoting the company’s new mainframe computers. It is the first known instance of spam, and it kicked off four decades worth of unwelcome, unwanted and unrelenting email abuses. Email has since become the de facto standard [...]

Backup Modernization Critical for Thwarting Ransomware Attacks

By |2020-09-15T13:34:57+00:00September 15th, 2020|Backup Recovery, Business Continuity, Security|

Ransomware attacks are up sharply during the coronavirus pandemic, with researchers identifying nearly 80 million such attacks during the first half of 2020 — a 109 percent increase from 2019’s midyear total. In a particularly concerning trend, many of these attacks are now targeting backup data in addition to primary data. Robust backup practices have [...]

Don’t Allow Users to Have Unfettered Access to Data Files

By |2020-09-02T01:26:22+00:00September 2nd, 2020|Cyber Security, IT Security, Security|

Few organizations would give every employee access to HR and accounting systems. But an astonishing number of organizations fail to control access to other sensitive information. A 2019 study by Varonis Data Lab found that 53 percent of companies had at least 1,000 sensitive files that could be accessed by all employees. Almost one-quarter (22 [...]

Frameworks Enable a Best-Practice Approach to Cybersecurity

By |2020-07-21T12:20:42+00:00July 21st, 2020|Cyber Security, Internet Security, IT Security, Regulatory Compliance, Security|

Cybersecurity has never been more difficult. Threats are growing more frequent, sophisticated and costly. Data, devices and other assets keep moving beyond the reach of network perimeter defenses. Increasing government and industry regulations keep adding layers of complexity. If only there was an instruction manual that explained how to deal with it all. Turns out, [...]

How Your MSP Can Help with Regulatory Compliance in the Age of Remote Work

By |2020-07-15T17:54:28+00:00July 15th, 2020|Managed Services, Regulatory Compliance, Security|

Many organizations have done a remarkable job of transitioning to remote work — virtually overnight. IT teams who may have had limited experience working with remote workers found themselves grappling with virtual private networks (VPNs), collaboration platforms, and cloud-based applications and data storage. They deserve a giant pat on the back for keeping their organizations [...]