Cyber Security
Controlling the Cyber Security Costs: Why It’s a Lot Easier Than You Think
One of the common themes that’s permeated a lot of the meetings I’ve been having with both current and prospective clients lately can all be summed up in a single word: security. These chats may not, however, be taking the shape you probably think they are. Yes, cyber security is critical and it’s an issue that is only getting more pressing as time goes on. But I’ve also found that…
Continued about Controlling the Cyber Security Costs: Why It’s a Lot Easier Than You ThinkCyber Crime Cases: Infected USB Drives Distributed at Data Security Event
During a recent data security expo hosted by Taiwan’s Presidential Office, 54 malware-infested thumb drives were handed out to the public by the Criminal Investigation Bureau. These infected USB sticks were among the 250 drives the bureau gave to winners of a game about cybersecurity knowledge at their exhibit.
Continued about Cyber Crime Cases: Infected USB Drives Distributed at Data Security EventAvoid A New Strain of Cloud Email Ransomware: Cloud Security Management
A white hacker recently developed a working ransomcloud strain that encrypts cloud email accounts like Office 365 in real-time. A scary thought when so many organizations trust the cloud and software manufacturers like Microsoft to keep their information secure.Â
Continued about Avoid A New Strain of Cloud Email Ransomware: Cloud Security ManagementTop 25 Most Popular Passwords of 2017
Each year, researchers from SplashData revealed the worst passwords of 2017, based on the over 5 million stolen login credentials made public over the year. Despite the continued warnings from cybersecurity experts, people continue to choose weak, easily guessable passwords to protect their most precious information.
Continued about Top 25 Most Popular Passwords of 2017Antivirus For Chrome: ESET Powers Google Virus Protection and Detection Program
Chrome Cleanup uses ESET technology to identify and eradicate suspicious or unwanted software on your Windows computer. The tool operates in the background, with no slowdowns or interruptions to the user with three easy steps.
Continued about Antivirus For Chrome: ESET Powers Google Virus Protection and Detection ProgramCybersecurity Defense: The Best Protection Against Ransomware
I just found a very interesting blog post by Jerome Wendt, President & Lead Analyst of DCIG, Inc., an independent storage analyst and consulting firm. He started out with “The prevailing wisdom is that if you back up your data you can recover from a ransomware attack. While this premise generally holds true, simply backing up your data no longer provides an absolute guarantee that you can recover from a…
Continued about Cybersecurity Defense: The Best Protection Against RansomwareCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place