Cybersecurity Defense: The Best Protection Against Ransomware

I just found a very interesting blog post by Jerome Wendt, President & Lead Analyst of DCIG, Inc., an independent storage analyst and consulting firm. He started out with “The prevailing wisdom is that if you back up your data you can recover from a ransomware attack. While this premise generally holds true, simply backing…

Read More

Ransomware News: The Current State of Ransomware Among SMBs

In a report conducted by Osterman Research and sponsored by Malwarebytes, more than 1,000 small and medium-sized businesses were surveyed in June 2017 about ransomware and other critical security issues. What we discovered was surprising—ransomware authors aren’t only targeting enterprise businesses for big payouts. They’ve got their greedy gaze on businesses of all sizes. In…

Read More

Ecommerce Security Tips: How to Protect Your User’s Sensitive Information

Topic: PCI, eCommerce eCommerce security is a constantly evolving topic for any organization, regardless of their size.  As the CEO & Cofounder of Trellis, a local full-service design firm, we partner with organizations to develop robust WordPress & Magento websites.  One of questions I often face is what a new or smaller business can do…

Read More

Why a Hybrid Infrastructure Makes Sense For Small Businesses

The latest outages of Public Internet Cloud Services, which affected millions of Microsoft Office365 and Amazon Web Services users in the US, is yet another example for why I am a strong proponent for businesses to consider a mix of Cloud and On-Premise technologies for hosting their data, commonly referred to as a Hybrid Infrastructure.…

Read More

Cybersecurity tips: 5 Things Every Small Business Should Know

Nearly every business believes the unfortunate data breaches and attacks only happen to others; that the overall risk of an attack on your business is low.  Why would anyone care to target me? The truth is that hackers would love nothing more than to gain access to your sensitive company data.  It’s why we decided…

Read More

Fraud Detection: Identifying Tech Support Scams

We’ve all received unsolicited calls before, most offering complimentary services or attempting to sell a product.  However, a growing trend in gaining access to an otherwise secure network involves deceiving a caller into divulging pertinent information, or worse, control of their computer to install malware. How It Works:  This alternate approach with initiating a hack by…

Read More