I recently read Carbon Blacks “Global Incident Response Threat Report” regarding the topic of Island Hopping. If you are not familiar with the term, it’s the act of a hacker gaining access to a network and then infiltrating the supply chain to gain access to clients...
Perhaps It should be called “Lack of Support” Occasionally, when we have brought on a brand-new client and we uncover that they have been struggling with technical issues, some of which are easily solvable by support. Once we uncover this, we can usually get them on...
Ransomware is a type of malware that holds a computer or data for ransom, requiring payment for the return of the data or control of the computer. The data being held ransom is often encrypted by the ransomware, which is then unencrypted when payment is received....
Zero trust security has gained traction in recent years but has been difficult for large organizations to implement. Developed by John Kindervag in 2010, a then principal analyst at Forrester Research Inc., the Zero Trust Network or Zero Trust Architecture is a...
If you have previously passed on backing up to the cloud because of price and functionality, it’s time to take a fresh look. There is now a landscape of affordable options with great features like System Recovery in the cloud. If you are still manually bringing...