logo
March 27, 2019 | Jeff Melnick

Defending Against Crypto-Ransomware Guide

Ransomware is one of the fastest growing classes of malicious software. In recent years, ransomware has evolved from a simple lock screen with the ransom damage into far more dangerous variants, such as crypto-ransomware. 1. What is  Crypto-Ransomware Unlike traditional malware,...
September 2, 2020 | Sarah Greesonbach

2 October Medical Data Breaches That Could Have Been Prevented

The IT industry fights to reduce and eliminate its overall risk for security breaches year in and year out. That’s why it’s so disheartening to read about recent breaches in the news. It always comes down to one concerning question: Could that have been me? The most productive thing we can...
September 2, 2020 | Richard Muniz

Security Issues in Disaster Recovery

There was a movie that came out a few years back with one line that has stuck with me, and the truth behind it is very evident. “There is opportunity in chaos!” And in recovery scenarios, opportunity abounds. One of the real problems when doing business recovery is that too often, our focus...
March 27, 2019 | Brian Svidergol

Phishing Attack Catches Another Organization Off Guard

Saint Agnes Health Care, Inc. announced that an attacker successfully phished an employee and obtained personally identifiable information of approximately 25,000 patients. The information included names, dates of birth, gender, medical record number, insurance information, and limited clinical...
May 20, 2019 | Russell Smith

4 Ways to Avoid Malware Like Lenovo Superfish

PCs sold by Lenovo between September 2014 and January 2015 came pre-installed with Superfish VisualDiscovery, a piece of malware claiming to improve users’ Internet experience by adding visual results to Google search and other websites. But in reality, the main purpose of the software was to add...
October 28, 2019 | Krishna Kumar

Ten Simple Ways to Prevent Security Breaches in Windows Server 2012

Windows Server is one of the most commonly deployed critical systems in the organization. Most of the applications used in the organization are also Windows based, plus there are other legacy applications built on these Windows platforms. Since these servers are used the most, they need to be...
September 2, 2020 | Krishna Kumar

Ten Simple Ways to Prevent Security Breaches in Windows File Server 2012

File server is the central location in any network containing all kinds of information which is saved and shared by users within the organization. There is no restriction on the type of information used and shared. Since it is one of the most common reach out place for the users in the...
September 2, 2020 | John O'Neill Sr.

Preventing the Next Threat

IT security is as old as IT itself. That said, simply relying on the strategies of yesterday isn’t enough to combat modern threats. Case in point: over the past year we’ve witnessed two of the largest and most effective IT security breaches ever; Heartbleed and the Target breach. The most...
July 6, 2020 | Brian Svidergol

Avoid Data Breaches: Top Five Tips

It is hard to keep up with all of the various computer security incidents occurring daily. One can't help but wonder if more incidents are being reported and spreading through social media and internet news or if more incidents are taking place. It is likely both. The good news is, over the last...
October 28, 2019 | Brian Keith Winstead

Heartbleed: A Common-Sense Approach to a Real Network Problem

You’ve probably heard all about the Heartbleed vulnerability by now. Although it might not mean the total collapse of the Internet, as initial wild reports suggested, it’s also not something you can simply ignore. There are definitely some steps business IT departments should take to ensure...
...