Security Training Awareness: Create A Plan and Track Effectiveness

email security on laptop

As robust as your organization’s security program, policies, and toolsets are, there is still one vulnerability that even the most secure IT department cannot control – your employees. Cybercriminals rely on the fact that many employees are inadequately trained and underestimate the risks of phishing scams and ransomware.  With over 53,000 security incidents and more … Read more

Welcome to the New Normal

ransomware skull and files

Welcome to the new normal, as we usher in another massive worldwide fear inspiring ransomware attack.  I will spare you the technical details of this specific malware, but I do feel it is important to understand the common elements of this latest attack, and the ongoing preferred methodology being used in ransomware attacks. In April of this … Read more

Top 10 Things We Can Learn from the Target Breach

cyber-security

For those of you not familiar with the SANS Institute http://www.sans.org, the SANS Institute was established in 1989 as a cooperative IT security research and education organization that today reaches more than 165,000 security professionals around the world.  It is a tremendous resource for everything related to IT security, and I highly encourage any organization or individual … Read more

The Blindside Of: Data Breaches

data breach

Over the course of the last couple of years as the number of data breaches has become much more frequent, and the public awareness surrounding those breaches has heightened, many of our customers have come to appreciate our record on data breaches.  To date, none of our managed service customers have had to manage or … Read more

The Legendary Router Malware

router and cables

When diagnosing your computer’s security problems, it should be noted that malware is not always located on the PC itself. A lot of the time, problems could be occurring in a number of different operating systems and browsers, making it difficult to diagnose the cause. A recent study by Ronald Kaplan and Dylan Kaplan proved … Read more

Take Care of Your Computer and it Will Take Care of You

computer maintenance service repair

When it comes to owning anything expensive, it’s important to practice proper maintenance. One of the most basic things you can do to take better care of your computer is to periodically examine the software on your computer. Although software maintenance can be challenging at times, it can be incredibly rewarding. It doesn’t have to … Read more

Internet Explorer 8 Zero-Day Vulnerability Found, but Not Patched

virus network icon

With the world still on edge about the recent vulnerability found in most versions of Internet Explorer, another one has been discovered, this time in Internet Explorer 8. This bug allows a hacker to execute malicious code when a user opens an infected email or webpage. However, this vulnerability is different than the one previously … Read more

You Can’t Live Without It

Disaster Recovery Plan, DRP

As I read the news and see images of the recent carnage caused by spring tornados all over the south-central United States,  I can’t help but be reminded that June 1st, the official start of the 2014 hurricane season, is now only 14 days away. If you are unlucky enough to have your building hit by a … Read more

Get “Replicated”

disaster recovery button

Backup technology is one of the areas of IT infrastructure that has seen some of the biggest changes in the last 5 years.  Tape backup has long been the standard in the industry for maintaining point-in-time snapshot backups. This method has been almost completely replaced by disk-to-NAS backups. Disk-to-NAS backups have many advantages over the … Read more

Urgent: Protect Yourself Against Heartbleed

heartbleed bug icon

April 7th 2014 was a big day for the world, not only because Microsoft ended security support for Windows XP, but because a massive security flaw was found in the OpenSSL cryptographic library. This problem, called the Heartbleed bug, was found by Google Security, and it leaks information from any applications and services utilizing OpenSSL. The problem, … Read more

We use cookies to gather information about the way you interact with our website, to create reports, and overall help us in improving the website. To learn more about our cookie policy, view our Privacy Policy. By clicking “Accept & Close”, you consent to the use of cookies unless you have disabled them.