Four Ways Ransomware Can Destroy Your Backups

By Chris Souza | September 14th, 2017 | Network Security

I just found a very interesting blog post by Jerome Wendt, President & Lead Analyst of DCIG, Inc., an independent storage analyst and consulting firm. He started out with “The prevailing wisdom is that if you back up your data you can recover from a ransomware attack. While this premise generally holds true, simply backing … Continued

Why Hybrid Technologies Make Sense…

By Gerard Louise | March 27th, 2017 | Cloud Services

The latest outages of Public Internet Cloud Services, which affected millions of Microsoft Office365 and Amazon Web Services users in the US, is yet another example for why I am a strong proponent for businesses to consider a mix of Cloud and On-Premise technologies for hosting their data, commonly referred to as a Hybrid Infrastructure. … Continued

An Inside Job: The Real Threat to Your Business Network’s Security

By Roger Murray | December 8th, 2016 | Project & Contracted Services

Today, the number of types of cyber-attacks which threaten the security of your businesses are endless.  We’ve discussed the greatest weakness in network security being users before, but the focus was in a non-acting participant being coerced into clicking on a malicious link or opening a dangerous attachment. We often focus so much attention to … Continued

What are the Benefits to Cloud Computing & IaaS?

By Roger Murray | December 7th, 2016 | Cloud Services

While the reasons behind considering a cloud based network infrastructure may vary, businesses across all industries and sizes are turning to the cloud to scale their organization.  The adoption of cloud services is accelerating at a much more rapid pace than previously anticipated, with a considerable amount considering an Infrastructure-as-a-Service (IaaS) environment. But what are … Continued

Identifying Tech Support Fraud

By Roger Murray | November 7th, 2016 | Network Security

We’ve all received unsolicited calls before, most offering complimentary services or attempting to sell a product.  However, a growing trend in gaining access to an otherwise secure network involves deceiving a caller into divulging pertinent information, or worse, control of their computer to install malware. How It Works:  This alternate approach with initiating a hack by … Continued

Understanding Information Technology Assessments

By Gerard Louise | October 24th, 2016 | Network Security

The term Information Technology (IT) Assessment is often convoluted because it is so often portrayed as the simple and easy process of scanning an organization’s existing network.  However, this could not be further from the truth.  It is important to remember that a formal Technology Assessment is not a Technology Audit.   The use of terminology … Continued

Lost & Found: The Dangers of Mystery USB Drives

By Kenneth Sprague | October 3rd, 2016 | Network Security

So if you found a USB Stick in the parking lot this morning, what would you do?  What if you found one in the course of your job, in a rental car, or in a “Lost & Found” box in your office?  You would be curious to see what is on the drive or inclined … Continued

Study Reveals More Than 50% of SMBs Have Experienced a Data Breach in Past Year

By Roger Murray | August 8th, 2016 | Network Security

A new study on the topic of Cyber-security and the proliferation of cyber-attacks against Small and Medium-Sized Businesses (SMB) was released this month. Historically, criminals would focus attacks on larger enterprise level organizations in an effort to reap a much larger reward. However, the level of technical expertise needed to infiltrate these companies’ security required … Continued

Need Support? Call Us Today

Available 24 hours a day, 7 days a week
1-508-543-6979